Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-26461 (GCVE-0-2024-26461)
Vulnerability from cvelistv5
- n/a
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:19.361Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240415-0011/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "kerberos_5",
            "vendor": "mit",
            "versions": [
              {
                "status": "affected",
                "version": "1.21.2"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-26461",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T15:09:48.143388Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-770",
                "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T15:15:42.206Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-15T15:06:17.596898",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240415-0011/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-26461",
    "datePublished": "2024-02-26T00:00:00",
    "dateReserved": "2024-02-19T00:00:00",
    "dateUpdated": "2024-08-14T15:15:42.206Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-26461\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-02-29T01:44:18.820\",\"lastModified\":\"2025-05-23T15:30:30.847\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\"},{\"lang\":\"es\",\"value\":\"Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F95920FF-DDA8-4D74-9CFE-81FCD071031D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280AA828-6FA9-4260-8EC1-019423B966E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD886814-B4A0-4764-9F08-2060601D8E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5921A877-18BF-43FE-915C-D226E140ACFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]}],\"references\":[{\"url\":\"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240415-0011/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240415-0011/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240415-0011/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:07:19.361Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-26461\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-14T15:09:48.143388Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:*\"], \"vendor\": \"mit\", \"product\": \"kerberos_5\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.21.2\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-14T15:15:33.833Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240415-0011/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-04-15T15:06:17.596898\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-26461\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-14T15:15:42.206Z\", \"dateReserved\": \"2024-02-19T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2024-02-26T00:00:00\", \"assignerShortName\": \"mitre\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  ghsa-jc8v-q399-gfq9
Vulnerability from github
Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
{
  "affected": [],
  "aliases": [
    "CVE-2024-26461"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-770"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-02-29T01:44:18Z",
    "severity": "HIGH"
  },
  "details": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
  "id": "GHSA-jc8v-q399-gfq9",
  "modified": "2024-08-14T18:32:36Z",
  "published": "2024-02-29T03:33:18Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
    },
    {
      "type": "WEB",
      "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20240415-0011"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  CERTFR-2024-AVI-0579
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.12 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 sans le correctif de sécurité PH61489 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 sans le correctif de sécurité PH61489 | ||
| IBM | QRadar | QRadar Deployment Intelligence App versions antérieures à 3.0.14 | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.23.0 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar Suite Software versions antérieures à 1.10.23.0 | ||
| IBM | QRadar | Security QRadar EDR versions antérieures à 3.12.9 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar WinCollect Agent versions antérieures à 10.1.11 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.12",
      "product": {
        "name": "Spectrum",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25 sans le correctif de s\u00e9curit\u00e9 PH61489",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20 sans le correctif de s\u00e9curit\u00e9 PH61489",
      "product": {
        "name": "WebSphere",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.14",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.23.0",
      "product": {
        "name": "Cloud Pak",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX versions 7.2 et 7.3 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.23.0",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.9",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS versions 3.1 et 4.1 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar WinCollect Agent versions ant\u00e9rieures \u00e0 10.1.11",
      "product": {
        "name": "QRadar",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-29483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
    },
    {
      "name": "CVE-2024-1597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
    },
    {
      "name": "CVE-2024-29041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-28849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
    },
    {
      "name": "CVE-2024-35154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
    },
    {
      "name": "CVE-2024-4068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-22353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
    },
    {
      "name": "CVE-2024-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
    },
    {
      "name": "CVE-2023-50312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2024-28102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2024-34997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
    },
    {
      "name": "CVE-2022-3287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
    },
    {
      "name": "CVE-2020-13936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2023-45802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
    },
    {
      "name": "CVE-2023-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
    },
    {
      "name": "CVE-2024-25026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
    },
    {
      "name": "CVE-2024-34062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2021-41072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
    },
    {
      "name": "CVE-2024-28176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
    },
    {
      "name": "CVE-2024-1135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2024-2379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
    },
    {
      "name": "CVE-2024-22329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-31122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2023-51775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-3019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
    },
    {
      "name": "CVE-2024-5206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
    },
    {
      "name": "CVE-2024-27088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2023-44483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2024-28863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2024-27270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2023-46158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-6387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
    },
    {
      "name": "CVE-2024-25023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25023"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2021-40153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    }
  ],
  "initial_release_date": "2024-07-12T00:00:00",
  "last_revision_date": "2024-07-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0579",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159768",
      "url": "https://www.ibm.com/support/pages/node/7159768"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7160017",
      "url": "https://www.ibm.com/support/pages/node/7160017"
    },
    {
      "published_at": "2024-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159781",
      "url": "https://www.ibm.com/support/pages/node/7159781"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7160014",
      "url": "https://www.ibm.com/support/pages/node/7160014"
    },
    {
      "published_at": "2024-07-12",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7160134",
      "url": "https://www.ibm.com/support/pages/node/7160134"
    },
    {
      "published_at": "2024-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159771",
      "url": "https://www.ibm.com/support/pages/node/7159771"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159867",
      "url": "https://www.ibm.com/support/pages/node/7159867"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159865",
      "url": "https://www.ibm.com/support/pages/node/7159865"
    },
    {
      "published_at": "2024-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159527",
      "url": "https://www.ibm.com/support/pages/node/7159527"
    },
    {
      "published_at": "2024-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159825",
      "url": "https://www.ibm.com/support/pages/node/7159825"
    },
    {
      "published_at": "2024-07-10",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159934",
      "url": "https://www.ibm.com/support/pages/node/7159934"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7159920",
      "url": "https://www.ibm.com/support/pages/node/7159920"
    },
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7160013",
      "url": "https://www.ibm.com/support/pages/node/7160013"
    }
  ]
}
  CERTFR-2024-AVI-0958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.x antérieures à 2.3.4.1 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.13 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.2 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | AIX | AIX version 7.3 avec un fichier python3.9.base versions antérieures à 3.9.20.0 | ||
| IBM | AIX | AIX version 7.3 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 IF01 | ||
| IBM | Cloud Pak System | Cloud Pak System versions 2.3.4.0 avec Db2 versions antérieures à 11.5.9 Special Build | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.3.1.x antérieures à 6.3.1.0 iFix03 | ||
| IBM | VIOS | VIOS version 3.1 avec un fichier tcl.base versions antérieures à 8.6.10.1 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.27.0 | ||
| IBM | Cloud Transformation Advisor | Cloud Transformation Advisor versions antérieures à 3.10.2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.10.27.0 | ||
| IBM | Sterling Control Center | Sterling Control Center versions 6.2.1.x antérieures à 6.2.1.0 iFix14 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.15 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cloud Pak System versions 2.3.4.x ant\u00e9rieures \u00e0 2.3.4.1",
      "product": {
        "name": "Cloud Pak System",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.13",
      "product": {
        "name": "Security QRadar EDR",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 4.1 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.2 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec un fichier python3.9.base versions ant\u00e9rieures \u00e0 3.9.20.0",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "AIX version 7.3 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "AIX",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10 IF01",
      "product": {
        "name": "QRadar SIEM",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak System versions 2.3.4.0 avec Db2 versions ant\u00e9rieures \u00e0 11.5.9 Special Build",
      "product": {
        "name": "Cloud Pak System",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.3.1.x ant\u00e9rieures \u00e0 6.3.1.0 iFix03",
      "product": {
        "name": "Sterling Control Center",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "VIOS version 3.1 avec un fichier tcl.base versions ant\u00e9rieures \u00e0 8.6.10.1",
      "product": {
        "name": "VIOS",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.27.0",
      "product": {
        "name": "Cloud Pak",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Transformation Advisor versions ant\u00e9rieures \u00e0 3.10.2 ",
      "product": {
        "name": "Cloud Transformation Advisor",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.27.0",
      "product": {
        "name": "QRadar Suite Software",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Sterling Control Center versions 6.2.1.x ant\u00e9rieures \u00e0 6.2.1.0 iFix14",
      "product": {
        "name": "Sterling Control Center",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.15",
      "product": {
        "name": "QRadar Deployment Intelligence App",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2020-25659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
    },
    {
      "name": "CVE-2020-36242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
    },
    {
      "name": "CVE-2022-23181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23181"
    },
    {
      "name": "CVE-2021-42340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340"
    },
    {
      "name": "CVE-2022-29885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
    },
    {
      "name": "CVE-2022-34305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34305"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2022-25762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
    },
    {
      "name": "CVE-2022-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2023-28708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28708"
    },
    {
      "name": "CVE-2022-24999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-38325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-28487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
    },
    {
      "name": "CVE-2022-23471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
    },
    {
      "name": "CVE-2023-28486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
    },
    {
      "name": "CVE-2023-25153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2023-25173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
    },
    {
      "name": "CVE-2022-31030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
    },
    {
      "name": "CVE-2022-23648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
    },
    {
      "name": "CVE-2023-28746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
    },
    {
      "name": "CVE-2023-52451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
    },
    {
      "name": "CVE-2023-52584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52584"
    },
    {
      "name": "CVE-2023-52469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
    },
    {
      "name": "CVE-2023-52600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
    },
    {
      "name": "CVE-2023-52463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52463"
    },
    {
      "name": "CVE-2023-52599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
    },
    {
      "name": "CVE-2023-42465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
    },
    {
      "name": "CVE-2023-52530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52530"
    },
    {
      "name": "CVE-2024-26586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26586"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2023-49083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
    },
    {
      "name": "CVE-2023-2253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
    },
    {
      "name": "CVE-2024-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201"
    },
    {
      "name": "CVE-2023-52609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52609"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2023-50782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2023-52591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
    },
    {
      "name": "CVE-2024-26667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
    },
    {
      "name": "CVE-2023-52608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52608"
    },
    {
      "name": "CVE-2023-52486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
    },
    {
      "name": "CVE-2024-26614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26614"
    },
    {
      "name": "CVE-2024-25739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
    },
    {
      "name": "CVE-2023-52623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
    },
    {
      "name": "CVE-2023-52619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
    },
    {
      "name": "CVE-2024-29133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
    },
    {
      "name": "CVE-2024-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
    },
    {
      "name": "CVE-2024-26707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
    },
    {
      "name": "CVE-2024-26697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
    },
    {
      "name": "CVE-2024-26704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
    },
    {
      "name": "CVE-2023-52622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
    },
    {
      "name": "CVE-2024-26727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26727"
    },
    {
      "name": "CVE-2024-26718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
    },
    {
      "name": "CVE-2024-26702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
    },
    {
      "name": "CVE-2024-26710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
    },
    {
      "name": "CVE-2024-26810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26810"
    },
    {
      "name": "CVE-2024-26663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
    },
    {
      "name": "CVE-2024-26773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
    },
    {
      "name": "CVE-2024-26660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
    },
    {
      "name": "CVE-2024-26726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
    },
    {
      "name": "CVE-2024-26640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26640"
    },
    {
      "name": "CVE-2024-26802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
    },
    {
      "name": "CVE-2024-26733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
    },
    {
      "name": "CVE-2024-26700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
    },
    {
      "name": "CVE-2024-26772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
    },
    {
      "name": "CVE-2024-26696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
    },
    {
      "name": "CVE-2024-26698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
    },
    {
      "name": "CVE-2024-26714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2017-11468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11468"
    },
    {
      "name": "CVE-2023-45284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
    },
    {
      "name": "CVE-2023-52590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
    },
    {
      "name": "CVE-2021-46939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46939"
    },
    {
      "name": "CVE-2024-26870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26870"
    },
    {
      "name": "CVE-2024-27025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
    },
    {
      "name": "CVE-2024-26961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
    },
    {
      "name": "CVE-2024-26840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
    },
    {
      "name": "CVE-2024-26958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26958"
    },
    {
      "name": "CVE-2024-26843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26843"
    },
    {
      "name": "CVE-2024-26925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
    },
    {
      "name": "CVE-2024-27388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27388"
    },
    {
      "name": "CVE-2024-27020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
    },
    {
      "name": "CVE-2024-26960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26960"
    },
    {
      "name": "CVE-2024-26820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
    },
    {
      "name": "CVE-2024-26878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26878"
    },
    {
      "name": "CVE-2024-26852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
    },
    {
      "name": "CVE-2024-27065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
    },
    {
      "name": "CVE-2024-26825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
    },
    {
      "name": "CVE-2024-27019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
    },
    {
      "name": "CVE-2024-26668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26668"
    },
    {
      "name": "CVE-2024-26669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26669"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-21823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21823"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2023-52653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
    },
    {
      "name": "CVE-2024-26853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
    },
    {
      "name": "CVE-2022-48632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
    },
    {
      "name": "CVE-2024-29025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
    },
    {
      "name": "CVE-2024-35947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
    },
    {
      "name": "CVE-2024-36017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
    },
    {
      "name": "CVE-2024-36886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
    },
    {
      "name": "CVE-2024-36889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
    },
    {
      "name": "CVE-2024-36904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
    },
    {
      "name": "CVE-2024-36905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
    },
    {
      "name": "CVE-2024-36929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
    },
    {
      "name": "CVE-2024-36933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
    },
    {
      "name": "CVE-2024-36940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
    },
    {
      "name": "CVE-2024-36941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
    },
    {
      "name": "CVE-2024-36950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
    },
    {
      "name": "CVE-2024-36954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
    },
    {
      "name": "CVE-2021-47231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47231"
    },
    {
      "name": "CVE-2021-47284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47284"
    },
    {
      "name": "CVE-2021-47373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
    },
    {
      "name": "CVE-2021-47408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47408"
    },
    {
      "name": "CVE-2021-47449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47449"
    },
    {
      "name": "CVE-2021-47461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47461"
    },
    {
      "name": "CVE-2021-47468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
    },
    {
      "name": "CVE-2021-47491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47491"
    },
    {
      "name": "CVE-2021-47548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47548"
    },
    {
      "name": "CVE-2023-52662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
    },
    {
      "name": "CVE-2023-52679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
    },
    {
      "name": "CVE-2023-52707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
    },
    {
      "name": "CVE-2023-52730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
    },
    {
      "name": "CVE-2023-52756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52756"
    },
    {
      "name": "CVE-2023-52764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
    },
    {
      "name": "CVE-2023-52777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
    },
    {
      "name": "CVE-2023-52791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
    },
    {
      "name": "CVE-2023-52796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
    },
    {
      "name": "CVE-2023-52803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
    },
    {
      "name": "CVE-2023-52811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
    },
    {
      "name": "CVE-2023-52817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
    },
    {
      "name": "CVE-2023-52832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
    },
    {
      "name": "CVE-2023-52834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
    },
    {
      "name": "CVE-2023-52847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
    },
    {
      "name": "CVE-2023-52864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
    },
    {
      "name": "CVE-2024-26921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
    },
    {
      "name": "CVE-2024-26940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26940"
    },
    {
      "name": "CVE-2024-27395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
    },
    {
      "name": "CVE-2024-35801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
    },
    {
      "name": "CVE-2024-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35823"
    },
    {
      "name": "CVE-2024-35847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
    },
    {
      "name": "CVE-2024-35912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
    },
    {
      "name": "CVE-2024-35924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
    },
    {
      "name": "CVE-2024-35930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
    },
    {
      "name": "CVE-2024-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35938"
    },
    {
      "name": "CVE-2024-35940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35940"
    },
    {
      "name": "CVE-2024-35952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
    },
    {
      "name": "CVE-2024-36006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
    },
    {
      "name": "CVE-2024-36016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
    },
    {
      "name": "CVE-2024-36896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2023-52658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
    },
    {
      "name": "CVE-2024-26740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
    },
    {
      "name": "CVE-2024-26844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
    },
    {
      "name": "CVE-2024-26962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26962"
    },
    {
      "name": "CVE-2024-27434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27434"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-35810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
    },
    {
      "name": "CVE-2024-35814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
    },
    {
      "name": "CVE-2024-35824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
    },
    {
      "name": "CVE-2024-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
    },
    {
      "name": "CVE-2024-35946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
    },
    {
      "name": "CVE-2024-36020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
    },
    {
      "name": "CVE-2024-36025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
    },
    {
      "name": "CVE-2024-36921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
    },
    {
      "name": "CVE-2024-31076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
    },
    {
      "name": "CVE-2024-33621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
    },
    {
      "name": "CVE-2024-35807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
    },
    {
      "name": "CVE-2024-35893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
    },
    {
      "name": "CVE-2024-35896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
    },
    {
      "name": "CVE-2024-35897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35897"
    },
    {
      "name": "CVE-2024-35899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
    },
    {
      "name": "CVE-2024-35900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
    },
    {
      "name": "CVE-2024-35910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910"
    },
    {
      "name": "CVE-2024-35925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
    },
    {
      "name": "CVE-2024-36005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
    },
    {
      "name": "CVE-2024-36286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
    },
    {
      "name": "CVE-2024-36960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
    },
    {
      "name": "CVE-2024-36971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
    },
    {
      "name": "CVE-2024-38596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
    },
    {
      "name": "CVE-2024-38598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
    },
    {
      "name": "CVE-2024-38627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2023-52648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-34069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-4067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
    },
    {
      "name": "CVE-2022-48743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
    },
    {
      "name": "CVE-2022-48747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
    },
    {
      "name": "CVE-2023-52762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
    },
    {
      "name": "CVE-2023-52784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
    },
    {
      "name": "CVE-2023-52845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
    },
    {
      "name": "CVE-2024-26842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
    },
    {
      "name": "CVE-2024-36917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-36978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
    },
    {
      "name": "CVE-2024-38555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
    },
    {
      "name": "CVE-2024-38573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
    },
    {
      "name": "CVE-2024-21138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
    },
    {
      "name": "CVE-2024-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
    },
    {
      "name": "CVE-2024-21144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
    },
    {
      "name": "CVE-2024-21145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
    },
    {
      "name": "CVE-2024-21147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
    },
    {
      "name": "CVE-2024-26662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
    },
    {
      "name": "CVE-2024-26703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
    },
    {
      "name": "CVE-2024-26818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
    },
    {
      "name": "CVE-2024-26824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
    },
    {
      "name": "CVE-2024-26831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
    },
    {
      "name": "CVE-2024-27010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
    },
    {
      "name": "CVE-2024-27011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
    },
    {
      "name": "CVE-2024-36270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
    },
    {
      "name": "CVE-2024-36489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36489"
    },
    {
      "name": "CVE-2024-38615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
    },
    {
      "name": "CVE-2024-39276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
    },
    {
      "name": "CVE-2024-39476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
    },
    {
      "name": "CVE-2024-39487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
    },
    {
      "name": "CVE-2024-39495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
    },
    {
      "name": "CVE-2024-39502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
    },
    {
      "name": "CVE-2024-40902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
    },
    {
      "name": "CVE-2024-40927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
    },
    {
      "name": "CVE-2024-40974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
    },
    {
      "name": "CVE-2024-36010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
    },
    {
      "name": "CVE-2024-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-36000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
    },
    {
      "name": "CVE-2024-36927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
    },
    {
      "name": "CVE-2024-36979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
    },
    {
      "name": "CVE-2024-38538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
    },
    {
      "name": "CVE-2021-47018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47018"
    },
    {
      "name": "CVE-2021-47257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47257"
    },
    {
      "name": "CVE-2021-47304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47304"
    },
    {
      "name": "CVE-2021-47579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
    },
    {
      "name": "CVE-2021-47624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
    },
    {
      "name": "CVE-2022-48757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
    },
    {
      "name": "CVE-2023-52471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52471"
    },
    {
      "name": "CVE-2023-52775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
    },
    {
      "name": "CVE-2024-26837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
    },
    {
      "name": "CVE-2024-39472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-27267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-42232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
    },
    {
      "name": "CVE-2024-42236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
    },
    {
      "name": "CVE-2024-42244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
    },
    {
      "name": "CVE-2024-42247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
    },
    {
      "name": "CVE-2023-4692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
    },
    {
      "name": "CVE-2023-4693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-1048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-39689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39689"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-41042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
    },
    {
      "name": "CVE-2024-42238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
    },
    {
      "name": "CVE-2024-42259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42259"
    },
    {
      "name": "CVE-2024-43824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
    },
    {
      "name": "CVE-2024-43833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43833"
    },
    {
      "name": "CVE-2024-43858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43858"
    },
    {
      "name": "CVE-2021-42694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-42694"
    },
    {
      "name": "CVE-2023-50314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42252"
    },
    {
      "name": "CVE-2024-43832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
    },
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2024-42251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42251"
    },
    {
      "name": "CVE-2021-43980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43980"
    },
    {
      "name": "CVE-2023-20584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20584"
    },
    {
      "name": "CVE-2023-31356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31356"
    },
    {
      "name": "CVE-2023-36328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36328"
    },
    {
      "name": "CVE-2023-48161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
    },
    {
      "name": "CVE-2023-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5115"
    },
    {
      "name": "CVE-2023-52596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52596"
    },
    {
      "name": "CVE-2023-5764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5764"
    },
    {
      "name": "CVE-2024-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21529"
    },
    {
      "name": "CVE-2024-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21534"
    },
    {
      "name": "CVE-2024-25620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25620"
    },
    {
      "name": "CVE-2024-26147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26147"
    },
    {
      "name": "CVE-2024-26713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26713"
    },
    {
      "name": "CVE-2024-26721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
    },
    {
      "name": "CVE-2024-26823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26823"
    },
    {
      "name": "CVE-2024-30203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30203"
    },
    {
      "name": "CVE-2024-30205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30205"
    },
    {
      "name": "CVE-2024-31882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31882"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-35136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35136"
    },
    {
      "name": "CVE-2024-35152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35152"
    },
    {
      "name": "CVE-2024-37529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37529"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-39331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39331"
    },
    {
      "name": "CVE-2024-42254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42254"
    },
    {
      "name": "CVE-2024-42255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42255"
    },
    {
      "name": "CVE-2024-42256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42256"
    },
    {
      "name": "CVE-2024-42258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2024-43796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
    },
    {
      "name": "CVE-2024-43799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
    },
    {
      "name": "CVE-2024-43800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
    },
    {
      "name": "CVE-2024-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43857"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2024-45590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2024-46982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46982"
    },
    {
      "name": "CVE-2024-47764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47764"
    },
    {
      "name": "CVE-2024-47874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    }
  ],
  "initial_release_date": "2024-11-08T00:00:00",
  "last_revision_date": "2024-11-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0958",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
  "vendor_advisories": [
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174802",
      "url": "https://www.ibm.com/support/pages/node/7174802"
    },
    {
      "published_at": "2024-11-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174634",
      "url": "https://www.ibm.com/support/pages/node/7174634"
    },
    {
      "published_at": "2024-11-01",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174639",
      "url": "https://www.ibm.com/support/pages/node/7174639"
    },
    {
      "published_at": "2024-11-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175196",
      "url": "https://www.ibm.com/support/pages/node/7175196"
    },
    {
      "published_at": "2024-11-07",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175086",
      "url": "https://www.ibm.com/support/pages/node/7175086"
    },
    {
      "published_at": "2024-11-08",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175192",
      "url": "https://www.ibm.com/support/pages/node/7175192"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174799",
      "url": "https://www.ibm.com/support/pages/node/7174799"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174797",
      "url": "https://www.ibm.com/support/pages/node/7174797"
    },
    {
      "published_at": "2024-11-06",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174945",
      "url": "https://www.ibm.com/support/pages/node/7174945"
    },
    {
      "published_at": "2024-11-05",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7174912",
      "url": "https://www.ibm.com/support/pages/node/7174912"
    },
    {
      "published_at": "2024-11-07",
      "title": "Bulletin de s\u00e9curit\u00e9 IBM 7175166",
      "url": "https://www.ibm.com/support/pages/node/7175166"
    }
  ]
}
  CERTFR-2025-AVI-0864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2024-21171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
    },
    {
      "name": "CVE-2025-30681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2024-20977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
    },
    {
      "name": "CVE-2022-48564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2024-20985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
    },
    {
      "name": "CVE-2025-30689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-21160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
    },
    {
      "name": "CVE-2025-30715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2025-30682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
    },
    {
      "name": "CVE-2024-21052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
    },
    {
      "name": "CVE-2024-20964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
    },
    {
      "name": "CVE-2023-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
    },
    {
      "name": "CVE-2025-21500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
    },
    {
      "name": "CVE-2024-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
    },
    {
      "name": "CVE-2025-21503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
    },
    {
      "name": "CVE-2024-21053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
    },
    {
      "name": "CVE-2024-21142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
    },
    {
      "name": "CVE-2025-21494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2024-20976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2025-21519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
    },
    {
      "name": "CVE-2024-21200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
    },
    {
      "name": "CVE-2024-20998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
    },
    {
      "name": "CVE-2024-21231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2024-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
    },
    {
      "name": "CVE-2024-21102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
    },
    {
      "name": "CVE-2025-30703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-21049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2025-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
    },
    {
      "name": "CVE-2025-21505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
    },
    {
      "name": "CVE-2022-45061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-21157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2024-21015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
    },
    {
      "name": "CVE-2025-21501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
    },
    {
      "name": "CVE-2025-24528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
    },
    {
      "name": "CVE-2024-21166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2023-45918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
    },
    {
      "name": "CVE-2025-30696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
    },
    {
      "name": "CVE-2023-45285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
    },
    {
      "name": "CVE-2024-24783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
    },
    {
      "name": "CVE-2024-24791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
    },
    {
      "name": "CVE-2025-21584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
    },
    {
      "name": "CVE-2024-20962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
    },
    {
      "name": "CVE-2022-48565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2022-0391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
    },
    {
      "name": "CVE-2025-21521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
    },
    {
      "name": "CVE-2024-45341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-45289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2024-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2024-21009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-20969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
    },
    {
      "name": "CVE-2024-21201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
    },
    {
      "name": "CVE-2024-21177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2022-4203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-45290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
    },
    {
      "name": "CVE-2025-30683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
    },
    {
      "name": "CVE-2025-30699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2023-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
    },
    {
      "name": "CVE-2025-22866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2025-21492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-22112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
    },
    {
      "name": "CVE-2024-20966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2024-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
    },
    {
      "name": "CVE-2025-21555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2024-20972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
    },
    {
      "name": "CVE-2024-21159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2024-12085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2024-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
    },
    {
      "name": "CVE-2024-21194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
    },
    {
      "name": "CVE-2024-21196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
    },
    {
      "name": "CVE-2024-21179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
    },
    {
      "name": "CVE-2024-21199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
    },
    {
      "name": "CVE-2024-21050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
    },
    {
      "name": "CVE-2025-21574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
    },
    {
      "name": "CVE-2022-48566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2025-21580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2025-21575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
    },
    {
      "name": "CVE-2024-20961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
    },
    {
      "name": "CVE-2025-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
    },
    {
      "name": "CVE-2025-21577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
    },
    {
      "name": "CVE-2024-45336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
    },
    {
      "name": "CVE-2024-20996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-5642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
    },
    {
      "name": "CVE-2024-20983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
    },
    {
      "name": "CVE-2025-30705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
    },
    {
      "name": "CVE-2024-21237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
    },
    {
      "name": "CVE-2025-21536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
    },
    {
      "name": "CVE-2021-4189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
    },
    {
      "name": "CVE-2024-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
    },
    {
      "name": "CVE-2024-21127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
    },
    {
      "name": "CVE-2024-21134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
    },
    {
      "name": "CVE-2024-21000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
    },
    {
      "name": "CVE-2024-20984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2024-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
    },
    {
      "name": "CVE-2024-21130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
    },
    {
      "name": "CVE-2024-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2024-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
    },
    {
      "name": "CVE-2024-21057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
    },
    {
      "name": "CVE-2025-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2025-30684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-12087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
    },
    {
      "name": "CVE-2023-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-21135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2025-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2025-29088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2024-20963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
    },
    {
      "name": "CVE-2024-21096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2024-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2025-21490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
    },
    {
      "name": "CVE-2024-21137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-21062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
    },
    {
      "name": "CVE-2024-21055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
    },
    {
      "name": "CVE-2024-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2022-48560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
    },
    {
      "name": "CVE-2024-21165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2024-21056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-30721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2022-40735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
    },
    {
      "name": "CVE-2024-24787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
    },
    {
      "name": "CVE-2024-21047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-20981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
    },
    {
      "name": "CVE-2024-21185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2023-1255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
    },
    {
      "name": "CVE-2024-21013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
    },
    {
      "name": "CVE-2023-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
    },
    {
      "name": "CVE-2016-20013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2025-21491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
    },
    {
      "name": "CVE-2024-12747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-2097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
    },
    {
      "name": "CVE-2024-21162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-22092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2025-30722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2024-21060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2025-30687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
    },
    {
      "name": "CVE-2025-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
    },
    {
      "name": "CVE-2025-21559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
    },
    {
      "name": "CVE-2025-21504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
    },
    {
      "name": "CVE-2024-20974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
    },
    {
      "name": "CVE-2023-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
    },
    {
      "name": "CVE-2024-21125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-21518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
    },
    {
      "name": "CVE-2024-20993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
    },
    {
      "name": "CVE-2025-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
    },
    {
      "name": "CVE-2024-21129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2024-20982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2025-30693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
    },
    {
      "name": "CVE-2025-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
    },
    {
      "name": "CVE-2024-12088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
    },
    {
      "name": "CVE-2023-2975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2023-26604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2024-21087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
    },
    {
      "name": "CVE-2023-22064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
    },
    {
      "name": "CVE-2024-20971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
    },
    {
      "name": "CVE-2024-20978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2025-21497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
    },
    {
      "name": "CVE-2023-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-20973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2024-20965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2025-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
    },
    {
      "name": "CVE-2023-39804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
    },
    {
      "name": "CVE-2024-21061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2024-20967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2024-21163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
    },
    {
      "name": "CVE-2024-21069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
    },
    {
      "name": "CVE-2024-21051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-20970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
    },
    {
      "name": "CVE-2025-30685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
    },
    {
      "name": "CVE-2024-21054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
    },
    {
      "name": "CVE-2025-30695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
    },
    {
      "name": "CVE-2025-30688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
    },
    {
      "name": "CVE-2025-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
    },
    {
      "name": "CVE-2024-21230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
    },
    {
      "name": "CVE-2024-20968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
    },
    {
      "name": "CVE-2024-21173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2025-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-24784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2024-21008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-20994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    },
    {
      "name": "CVE-2023-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
    },
    {
      "name": "CVE-2023-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
    },
    {
      "name": "CVE-2023-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2024-20960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2023-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    }
  ],
  "initial_release_date": "2025-10-13T00:00:00",
  "last_revision_date": "2025-10-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0864",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
  "vendor_advisories": [
    {
      "published_at": "2025-10-10",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
    }
  ]
}
  CERTFR-2024-AVI-0741
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02",
      "product": {
        "name": "Secure Analytics",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-29483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
    },
    {
      "name": "CVE-2024-42472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
    },
    {
      "name": "CVE-2024-26934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
    },
    {
      "name": "CVE-2023-52477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
    },
    {
      "name": "CVE-2023-52675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
    },
    {
      "name": "CVE-2023-4692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
    },
    {
      "name": "CVE-2024-27059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
    },
    {
      "name": "CVE-2024-26656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2023-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
    },
    {
      "name": "CVE-2024-26974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
    },
    {
      "name": "CVE-2024-26897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
    },
    {
      "name": "CVE-2021-47055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
    },
    {
      "name": "CVE-2020-36777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
    },
    {
      "name": "CVE-2023-43788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43788"
    },
    {
      "name": "CVE-2024-27052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-26585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
    },
    {
      "name": "CVE-2024-25744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
    },
    {
      "name": "CVE-2024-26973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-27397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
    },
    {
      "name": "CVE-2024-35854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
    },
    {
      "name": "CVE-2023-52878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
    },
    {
      "name": "CVE-2021-47185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
    },
    {
      "name": "CVE-2024-23650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
    },
    {
      "name": "CVE-2024-26603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
    },
    {
      "name": "CVE-2024-26964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
    },
    {
      "name": "CVE-2024-5564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
    },
    {
      "name": "CVE-2021-33198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
    },
    {
      "name": "CVE-2024-26993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
    },
    {
      "name": "CVE-2019-25162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2023-39321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
    },
    {
      "name": "CVE-2024-3933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2023-52669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
    },
    {
      "name": "CVE-2019-11358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2022-3287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
    },
    {
      "name": "CVE-2024-36004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
    },
    {
      "name": "CVE-2024-26859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
    },
    {
      "name": "CVE-2020-13936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-35959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
    },
    {
      "name": "CVE-2018-20060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
    },
    {
      "name": "CVE-2024-35855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-3652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
    },
    {
      "name": "CVE-2024-26615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
    },
    {
      "name": "CVE-2023-45802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
    },
    {
      "name": "CVE-2024-26801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
    },
    {
      "name": "CVE-2024-36007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
    },
    {
      "name": "CVE-2021-47311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
    },
    {
      "name": "CVE-2023-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
    },
    {
      "name": "CVE-2024-26643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
    },
    {
      "name": "CVE-2024-26779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
    },
    {
      "name": "CVE-2024-32021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-24806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
    },
    {
      "name": "CVE-2024-35852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
    },
    {
      "name": "CVE-2024-23307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2023-52528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
    },
    {
      "name": "CVE-2024-27048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
    },
    {
      "name": "CVE-2021-47013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
    },
    {
      "name": "CVE-2023-52781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
    },
    {
      "name": "CVE-2024-35845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
    },
    {
      "name": "CVE-2021-41072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2021-47073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2024-26593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
    },
    {
      "name": "CVE-2022-48627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
    },
    {
      "name": "CVE-2021-47171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
    },
    {
      "name": "CVE-2024-26743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
    },
    {
      "name": "CVE-2023-52686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
    },
    {
      "name": "CVE-2021-47236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2023-6240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
    },
    {
      "name": "CVE-2024-32004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
    },
    {
      "name": "CVE-2021-47118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
    },
    {
      "name": "CVE-2024-35890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2023-6918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
    },
    {
      "name": "CVE-2024-22195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
    },
    {
      "name": "CVE-2023-52877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-32020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-32487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
    },
    {
      "name": "CVE-2024-26826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
    },
    {
      "name": "CVE-2024-27056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
    },
    {
      "name": "CVE-2024-26583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
    },
    {
      "name": "CVE-2024-26642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
    },
    {
      "name": "CVE-2021-47153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
    },
    {
      "name": "CVE-2024-35888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
    },
    {
      "name": "CVE-2023-52700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
    },
    {
      "name": "CVE-2023-31122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
    },
    {
      "name": "CVE-2023-52439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
    },
    {
      "name": "CVE-2021-47495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
    },
    {
      "name": "CVE-2024-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
    },
    {
      "name": "CVE-2019-14865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14865"
    },
    {
      "name": "CVE-2024-26906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
    },
    {
      "name": "CVE-2024-26610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
    },
    {
      "name": "CVE-2024-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
    },
    {
      "name": "CVE-2024-26584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-26919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
    },
    {
      "name": "CVE-2023-52445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-3019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2024-27014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
    },
    {
      "name": "CVE-2021-34558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
    },
    {
      "name": "CVE-2024-32465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2023-43804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
    },
    {
      "name": "CVE-2023-43789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43789"
    },
    {
      "name": "CVE-2024-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-26892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
    },
    {
      "name": "CVE-2024-35835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
    },
    {
      "name": "CVE-2024-26735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
    },
    {
      "name": "CVE-2023-52881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
    },
    {
      "name": "CVE-2023-4693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
    },
    {
      "name": "CVE-2021-46972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
    },
    {
      "name": "CVE-2023-52578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-34750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2021-46934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
    },
    {
      "name": "CVE-2024-1048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
    },
    {
      "name": "CVE-2023-6004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
    },
    {
      "name": "CVE-2023-52598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
    },
    {
      "name": "CVE-2020-11022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-26659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
    },
    {
      "name": "CVE-2023-52667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
    },
    {
      "name": "CVE-2024-26933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-52703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
    },
    {
      "name": "CVE-2023-52594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
    },
    {
      "name": "CVE-2024-26693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
    },
    {
      "name": "CVE-2023-52595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2023-45287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
    },
    {
      "name": "CVE-2022-48624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
    },
    {
      "name": "CVE-2024-26759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
    },
    {
      "name": "CVE-2023-52464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
    },
    {
      "name": "CVE-2023-52813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
    },
    {
      "name": "CVE-2024-35838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
    },
    {
      "name": "CVE-2023-52513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
    },
    {
      "name": "CVE-2023-52615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
    },
    {
      "name": "CVE-2023-52610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
    },
    {
      "name": "CVE-2023-52560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2023-39322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
    },
    {
      "name": "CVE-2023-52606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
    },
    {
      "name": "CVE-2021-47069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
    },
    {
      "name": "CVE-2024-35960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
    },
    {
      "name": "CVE-2022-39253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2024-26872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
    },
    {
      "name": "CVE-2020-26555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
    },
    {
      "name": "CVE-2024-26901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2024-35789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
    },
    {
      "name": "CVE-2023-52835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
    },
    {
      "name": "CVE-2024-26982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
    },
    {
      "name": "CVE-2021-47310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
    },
    {
      "name": "CVE-2023-52626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
    },
    {
      "name": "CVE-2024-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
    },
    {
      "name": "CVE-2024-26744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2024-35958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
    },
    {
      "name": "CVE-2021-47456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
    },
    {
      "name": "CVE-2021-40153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
    },
    {
      "name": "CVE-2024-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
    },
    {
      "name": "CVE-2022-48669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
    },
    {
      "name": "CVE-2023-52565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
    },
    {
      "name": "CVE-2023-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
    },
    {
      "name": "CVE-2021-47356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
    },
    {
      "name": "CVE-2024-26694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-26664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2021-47353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2023-52607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2018-25091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
    },
    {
      "name": "CVE-2023-5090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
    },
    {
      "name": "CVE-2024-27410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
    },
    {
      "name": "CVE-2021-46909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
    },
    {
      "name": "CVE-2024-35853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
    },
    {
      "name": "CVE-2024-26907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
    }
  ],
  "initial_release_date": "2024-09-05T00:00:00",
  "last_revision_date": "2024-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0741",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-05T00:00:00.000000"
    },
    {
      "description": "Ajout r\u00e9f\u00e9rence \u00e9diteur",
      "revision_date": "2024-09-06T00:00:00.000000"
    },
    {
      "description": "Correction d\u0027identifiants CVE erron\u00e9s",
      "revision_date": "2024-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
  "vendor_advisories": [
    {
      "published_at": "2024-09-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686",
      "url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02"
    }
  ]
}
  CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
      "product": {
        "name": "Tanzu Operations Manager",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
    },
    {
      "name": "CVE-2021-45105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
    },
    {
      "name": "CVE-2021-44228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
    },
    {
      "name": "CVE-2013-1548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
    },
    {
      "name": "CVE-2015-4779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
    },
    {
      "name": "CVE-2015-4780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
    },
    {
      "name": "CVE-2015-4787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
    },
    {
      "name": "CVE-2015-4790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
    },
    {
      "name": "CVE-2015-4778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
    },
    {
      "name": "CVE-2015-4782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
    },
    {
      "name": "CVE-2015-4789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
    },
    {
      "name": "CVE-2015-4764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
    },
    {
      "name": "CVE-2015-4783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
    },
    {
      "name": "CVE-2015-2583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
    },
    {
      "name": "CVE-2015-4781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
    },
    {
      "name": "CVE-2015-4776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
    },
    {
      "name": "CVE-2015-4786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
    },
    {
      "name": "CVE-2015-2656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
    },
    {
      "name": "CVE-2015-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
    },
    {
      "name": "CVE-2015-4785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
    },
    {
      "name": "CVE-2015-4754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
    },
    {
      "name": "CVE-2015-4775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
    },
    {
      "name": "CVE-2015-4777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
    },
    {
      "name": "CVE-2015-2640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
    },
    {
      "name": "CVE-2015-4774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
    },
    {
      "name": "CVE-2015-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
    },
    {
      "name": "CVE-2015-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
    },
    {
      "name": "CVE-2015-4784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
    },
    {
      "name": "CVE-2015-2654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
    },
    {
      "name": "CVE-2017-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
    },
    {
      "name": "CVE-2018-3280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
    },
    {
      "name": "CVE-2018-3137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
    },
    {
      "name": "CVE-2018-3285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
    },
    {
      "name": "CVE-2018-3182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
    },
    {
      "name": "CVE-2018-3186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
    },
    {
      "name": "CVE-2018-3195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
    },
    {
      "name": "CVE-2018-3286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
    },
    {
      "name": "CVE-2018-3170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
    },
    {
      "name": "CVE-2018-3279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
    },
    {
      "name": "CVE-2018-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
    },
    {
      "name": "CVE-2018-3203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
    },
    {
      "name": "CVE-2018-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
    },
    {
      "name": "CVE-2019-2530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
    },
    {
      "name": "CVE-2019-2436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
    },
    {
      "name": "CVE-2019-2539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
    },
    {
      "name": "CVE-2019-2494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
    },
    {
      "name": "CVE-2019-2535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
    },
    {
      "name": "CVE-2019-2533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
    },
    {
      "name": "CVE-2019-2495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
    },
    {
      "name": "CVE-2019-2513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
    },
    {
      "name": "CVE-2019-2536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
    },
    {
      "name": "CVE-2019-2502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
    },
    {
      "name": "CVE-2019-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
    },
    {
      "name": "CVE-2019-2587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
    },
    {
      "name": "CVE-2019-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
    },
    {
      "name": "CVE-2019-2691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
    },
    {
      "name": "CVE-2019-2606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
    },
    {
      "name": "CVE-2019-2630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
    },
    {
      "name": "CVE-2019-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
    },
    {
      "name": "CVE-2019-2623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
    },
    {
      "name": "CVE-2019-2695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
    },
    {
      "name": "CVE-2019-2596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
    },
    {
      "name": "CVE-2019-2580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
    },
    {
      "name": "CVE-2019-2644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
    },
    {
      "name": "CVE-2019-2681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
    },
    {
      "name": "CVE-2019-2617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
    },
    {
      "name": "CVE-2019-2636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
    },
    {
      "name": "CVE-2019-2689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
    },
    {
      "name": "CVE-2019-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
    },
    {
      "name": "CVE-2019-2593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
    },
    {
      "name": "CVE-2019-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
    },
    {
      "name": "CVE-2019-2585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
    },
    {
      "name": "CVE-2019-2631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
    },
    {
      "name": "CVE-2019-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
    },
    {
      "name": "CVE-2019-2620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
    },
    {
      "name": "CVE-2019-2688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
    },
    {
      "name": "CVE-2019-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
    },
    {
      "name": "CVE-2019-2635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
    },
    {
      "name": "CVE-2019-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
    },
    {
      "name": "CVE-2019-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
    },
    {
      "name": "CVE-2019-2685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
    },
    {
      "name": "CVE-2019-2687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
    },
    {
      "name": "CVE-2019-2607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-2811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
    },
    {
      "name": "CVE-2019-2740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
    },
    {
      "name": "CVE-2019-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
    },
    {
      "name": "CVE-2019-2808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
    },
    {
      "name": "CVE-2019-2738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
    },
    {
      "name": "CVE-2019-2819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
    },
    {
      "name": "CVE-2019-2737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
    },
    {
      "name": "CVE-2019-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
    },
    {
      "name": "CVE-2019-2778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
    },
    {
      "name": "CVE-2019-2822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
    },
    {
      "name": "CVE-2019-2802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
    },
    {
      "name": "CVE-2019-2803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
    },
    {
      "name": "CVE-2019-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
    },
    {
      "name": "CVE-2019-2826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
    },
    {
      "name": "CVE-2019-2784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
    },
    {
      "name": "CVE-2019-2789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
    },
    {
      "name": "CVE-2019-2801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
    },
    {
      "name": "CVE-2019-2791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
    },
    {
      "name": "CVE-2019-2798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
    },
    {
      "name": "CVE-2019-2796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
    },
    {
      "name": "CVE-2019-2815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
    },
    {
      "name": "CVE-2019-2810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
    },
    {
      "name": "CVE-2019-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
    },
    {
      "name": "CVE-2019-2758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
    },
    {
      "name": "CVE-2019-2757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
    },
    {
      "name": "CVE-2019-2785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
    },
    {
      "name": "CVE-2019-2747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
    },
    {
      "name": "CVE-2019-2741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
    },
    {
      "name": "CVE-2019-2830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
    },
    {
      "name": "CVE-2019-2834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
    },
    {
      "name": "CVE-2019-2743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
    },
    {
      "name": "CVE-2019-2739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
    },
    {
      "name": "CVE-2019-2805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
    },
    {
      "name": "CVE-2019-2797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
    },
    {
      "name": "CVE-2019-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
    },
    {
      "name": "CVE-2019-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
    },
    {
      "name": "CVE-2019-2746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
    },
    {
      "name": "CVE-2019-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
    },
    {
      "name": "CVE-2019-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
    },
    {
      "name": "CVE-2019-2914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
    },
    {
      "name": "CVE-2019-2960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
    },
    {
      "name": "CVE-2019-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
    },
    {
      "name": "CVE-2019-2968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
    },
    {
      "name": "CVE-2019-2993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
    },
    {
      "name": "CVE-2019-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
    },
    {
      "name": "CVE-2019-2969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
    },
    {
      "name": "CVE-2019-3011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
    },
    {
      "name": "CVE-2019-2967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
    },
    {
      "name": "CVE-2019-2946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
    },
    {
      "name": "CVE-2019-2966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
    },
    {
      "name": "CVE-2019-2957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
    },
    {
      "name": "CVE-2019-2948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
    },
    {
      "name": "CVE-2019-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
    },
    {
      "name": "CVE-2019-3004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
    },
    {
      "name": "CVE-2019-2998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
    },
    {
      "name": "CVE-2019-2911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
    },
    {
      "name": "CVE-2019-2950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
    },
    {
      "name": "CVE-2019-2910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
    },
    {
      "name": "CVE-2019-3018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
    },
    {
      "name": "CVE-2019-2974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
    },
    {
      "name": "CVE-2019-2991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
    },
    {
      "name": "CVE-2019-2997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
    },
    {
      "name": "CVE-2019-2938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
    },
    {
      "name": "CVE-2019-3003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
    },
    {
      "name": "CVE-2019-2982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
    },
    {
      "name": "CVE-2019-2963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
    },
    {
      "name": "CVE-2020-2579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
    },
    {
      "name": "CVE-2020-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
    },
    {
      "name": "CVE-2020-2577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
    },
    {
      "name": "CVE-2020-2679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
    },
    {
      "name": "CVE-2020-2570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
    },
    {
      "name": "CVE-2020-2572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
    },
    {
      "name": "CVE-2020-2627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
    },
    {
      "name": "CVE-2020-2660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
    },
    {
      "name": "CVE-2020-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
    },
    {
      "name": "CVE-2020-2573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
    },
    {
      "name": "CVE-2020-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
    },
    {
      "name": "CVE-2020-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
    },
    {
      "name": "CVE-2020-2574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
    },
    {
      "name": "CVE-2020-2770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
    },
    {
      "name": "CVE-2020-2925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
    },
    {
      "name": "CVE-2020-2853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
    },
    {
      "name": "CVE-2020-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
    },
    {
      "name": "CVE-2020-2928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
    },
    {
      "name": "CVE-2020-2897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
    },
    {
      "name": "CVE-2020-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
    },
    {
      "name": "CVE-2020-2765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
    },
    {
      "name": "CVE-2020-2761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
    },
    {
      "name": "CVE-2020-2790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
    },
    {
      "name": "CVE-2020-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
    },
    {
      "name": "CVE-2020-2904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
    },
    {
      "name": "CVE-2020-2893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
    },
    {
      "name": "CVE-2020-2760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
    },
    {
      "name": "CVE-2020-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
    },
    {
      "name": "CVE-2020-2903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
    },
    {
      "name": "CVE-2020-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
    },
    {
      "name": "CVE-2020-2806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
    },
    {
      "name": "CVE-2020-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
    },
    {
      "name": "CVE-2020-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
    },
    {
      "name": "CVE-2020-2926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
    },
    {
      "name": "CVE-2020-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
    },
    {
      "name": "CVE-2020-2921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
    },
    {
      "name": "CVE-2020-2779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
    },
    {
      "name": "CVE-2020-2892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
    },
    {
      "name": "CVE-2020-2896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
    },
    {
      "name": "CVE-2020-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
    },
    {
      "name": "CVE-2020-2895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
    },
    {
      "name": "CVE-2020-2930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
    },
    {
      "name": "CVE-2020-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
    },
    {
      "name": "CVE-2020-2759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
    },
    {
      "name": "CVE-2020-2763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
    },
    {
      "name": "CVE-2020-14550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
    },
    {
      "name": "CVE-2020-14567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
    },
    {
      "name": "CVE-2020-14559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
    },
    {
      "name": "CVE-2020-14576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
    },
    {
      "name": "CVE-2020-14540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
    },
    {
      "name": "CVE-2020-14547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
    },
    {
      "name": "CVE-2020-14553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
    },
    {
      "name": "CVE-2020-14539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
    },
    {
      "name": "CVE-2020-14845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
    },
    {
      "name": "CVE-2020-14799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
    },
    {
      "name": "CVE-2020-14793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
    },
    {
      "name": "CVE-2020-14888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
    },
    {
      "name": "CVE-2020-14790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
    },
    {
      "name": "CVE-2020-14789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
    },
    {
      "name": "CVE-2020-14672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
    },
    {
      "name": "CVE-2020-14846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
    },
    {
      "name": "CVE-2020-14771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
    },
    {
      "name": "CVE-2020-14873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
    },
    {
      "name": "CVE-2020-14791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
    },
    {
      "name": "CVE-2020-14769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
    },
    {
      "name": "CVE-2020-14844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
    },
    {
      "name": "CVE-2020-14809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
    },
    {
      "name": "CVE-2020-14860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
    },
    {
      "name": "CVE-2020-14866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
    },
    {
      "name": "CVE-2020-14861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
    },
    {
      "name": "CVE-2020-14773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
    },
    {
      "name": "CVE-2020-14776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
    },
    {
      "name": "CVE-2020-14852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
    },
    {
      "name": "CVE-2020-14760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
    },
    {
      "name": "CVE-2020-14870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
    },
    {
      "name": "CVE-2020-14837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
    },
    {
      "name": "CVE-2020-14893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
    },
    {
      "name": "CVE-2020-14836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
    },
    {
      "name": "CVE-2020-14829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
    },
    {
      "name": "CVE-2020-14868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
    },
    {
      "name": "CVE-2020-14827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
    },
    {
      "name": "CVE-2020-14839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
    },
    {
      "name": "CVE-2020-14777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
    },
    {
      "name": "CVE-2020-14812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
    },
    {
      "name": "CVE-2020-14775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
    },
    {
      "name": "CVE-2020-14838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
    },
    {
      "name": "CVE-2020-14869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
    },
    {
      "name": "CVE-2020-14765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
    },
    {
      "name": "CVE-2020-14814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
    },
    {
      "name": "CVE-2020-14821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
    },
    {
      "name": "CVE-2020-14830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
    },
    {
      "name": "CVE-2020-14828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
    },
    {
      "name": "CVE-2020-14804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
    },
    {
      "name": "CVE-2020-14800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
    },
    {
      "name": "CVE-2020-14891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
    },
    {
      "name": "CVE-2020-14848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
    },
    {
      "name": "CVE-2020-14867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
    },
    {
      "name": "CVE-2020-14785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
    },
    {
      "name": "CVE-2020-14794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
    },
    {
      "name": "CVE-2020-14786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2021-2010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
    },
    {
      "name": "CVE-2021-2001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
    },
    {
      "name": "CVE-2021-2060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
    },
    {
      "name": "CVE-2021-2014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
    },
    {
      "name": "CVE-2021-2032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
    },
    {
      "name": "CVE-2021-2036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
    },
    {
      "name": "CVE-2021-2007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
    },
    {
      "name": "CVE-2021-2011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
    },
    {
      "name": "CVE-2021-2022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2021-2308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
    },
    {
      "name": "CVE-2021-2213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
    },
    {
      "name": "CVE-2021-2172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
    },
    {
      "name": "CVE-2021-2293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
    },
    {
      "name": "CVE-2021-2208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
    },
    {
      "name": "CVE-2021-2196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2021-2193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
    },
    {
      "name": "CVE-2021-2300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
    },
    {
      "name": "CVE-2021-2299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
    },
    {
      "name": "CVE-2021-2212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
    },
    {
      "name": "CVE-2021-2278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
    },
    {
      "name": "CVE-2021-2164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
    },
    {
      "name": "CVE-2021-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
    },
    {
      "name": "CVE-2021-2170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
    },
    {
      "name": "CVE-2021-2304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
    },
    {
      "name": "CVE-2021-2215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
    },
    {
      "name": "CVE-2021-25214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
    },
    {
      "name": "CVE-2012-6153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
    },
    {
      "name": "CVE-2021-2429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
    },
    {
      "name": "CVE-2021-2426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
    },
    {
      "name": "CVE-2021-2427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
    },
    {
      "name": "CVE-2021-2339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
    },
    {
      "name": "CVE-2021-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
    },
    {
      "name": "CVE-2021-2387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
    },
    {
      "name": "CVE-2021-2383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
    },
    {
      "name": "CVE-2021-2384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
    },
    {
      "name": "CVE-2021-2412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
    },
    {
      "name": "CVE-2021-2441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
    },
    {
      "name": "CVE-2021-2410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
    },
    {
      "name": "CVE-2021-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
    },
    {
      "name": "CVE-2021-2424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
    },
    {
      "name": "CVE-2021-2352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
    },
    {
      "name": "CVE-2021-2402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
    },
    {
      "name": "CVE-2021-2440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
    },
    {
      "name": "CVE-2021-2340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-2374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2021-2411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
    },
    {
      "name": "CVE-2021-2418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
    },
    {
      "name": "CVE-2021-2367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
    },
    {
      "name": "CVE-2021-2354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
    },
    {
      "name": "CVE-2021-2422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2021-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
    },
    {
      "name": "CVE-2020-28500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-35640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
    },
    {
      "name": "CVE-2021-35626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
    },
    {
      "name": "CVE-2021-2478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2021-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
    },
    {
      "name": "CVE-2021-35628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
    },
    {
      "name": "CVE-2021-35630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
    },
    {
      "name": "CVE-2021-35644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
    },
    {
      "name": "CVE-2021-2479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
    },
    {
      "name": "CVE-2021-35638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
    },
    {
      "name": "CVE-2021-35646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
    },
    {
      "name": "CVE-2021-35596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
    },
    {
      "name": "CVE-2021-35643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
    },
    {
      "name": "CVE-2021-35637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
    },
    {
      "name": "CVE-2021-35623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
    },
    {
      "name": "CVE-2021-35632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
    },
    {
      "name": "CVE-2021-35641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-35636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
    },
    {
      "name": "CVE-2021-35546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
    },
    {
      "name": "CVE-2021-35627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
    },
    {
      "name": "CVE-2021-35625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
    },
    {
      "name": "CVE-2021-35608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
    },
    {
      "name": "CVE-2021-35597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
    },
    {
      "name": "CVE-2021-35537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
    },
    {
      "name": "CVE-2021-2481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
    },
    {
      "name": "CVE-2021-35622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
    },
    {
      "name": "CVE-2021-35610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
    },
    {
      "name": "CVE-2021-35633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
    },
    {
      "name": "CVE-2021-35634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
    },
    {
      "name": "CVE-2021-35629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
    },
    {
      "name": "CVE-2021-35631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
    },
    {
      "name": "CVE-2021-35645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
    },
    {
      "name": "CVE-2021-35647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
    },
    {
      "name": "CVE-2021-35612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
    },
    {
      "name": "CVE-2021-35639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
    },
    {
      "name": "CVE-2021-35648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
    },
    {
      "name": "CVE-2021-35607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
    },
    {
      "name": "CVE-2021-35602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
    },
    {
      "name": "CVE-2021-35577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
    },
    {
      "name": "CVE-2021-35642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
    },
    {
      "name": "CVE-2021-35575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
    },
    {
      "name": "CVE-2021-35635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
    },
    {
      "name": "CVE-2021-35591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
    },
    {
      "name": "CVE-2021-25219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
    },
    {
      "name": "CVE-2021-3875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
    },
    {
      "name": "CVE-2019-10744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
    },
    {
      "name": "CVE-2022-21352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2022-21254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
    },
    {
      "name": "CVE-2022-21265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
    },
    {
      "name": "CVE-2022-21348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
    },
    {
      "name": "CVE-2022-21372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2022-21368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
    },
    {
      "name": "CVE-2022-21339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
    },
    {
      "name": "CVE-2022-21264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
    },
    {
      "name": "CVE-2022-21297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
    },
    {
      "name": "CVE-2022-21379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
    },
    {
      "name": "CVE-2022-21253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
    },
    {
      "name": "CVE-2022-21301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
    },
    {
      "name": "CVE-2022-21378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
    },
    {
      "name": "CVE-2022-21370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
    },
    {
      "name": "CVE-2022-21302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
    },
    {
      "name": "CVE-2022-21249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2022-21342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
    },
    {
      "name": "CVE-2022-21362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2022-21256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
    },
    {
      "name": "CVE-2022-21358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
    },
    {
      "name": "CVE-2022-21374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-4193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
    },
    {
      "name": "CVE-2020-15366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
    },
    {
      "name": "CVE-2022-22965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
    },
    {
      "name": "CVE-2022-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
    },
    {
      "name": "CVE-2022-21418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
    },
    {
      "name": "CVE-2022-21412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
    },
    {
      "name": "CVE-2022-21437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
    },
    {
      "name": "CVE-2022-21478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
    },
    {
      "name": "CVE-2022-21479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
    },
    {
      "name": "CVE-2022-21438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
    },
    {
      "name": "CVE-2022-21440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2022-21415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
    },
    {
      "name": "CVE-2022-21459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2022-21414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
    },
    {
      "name": "CVE-2022-21413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
    },
    {
      "name": "CVE-2022-21436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
    },
    {
      "name": "CVE-2022-21435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
    },
    {
      "name": "CVE-2022-21462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2022-21457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
    },
    {
      "name": "CVE-2022-21425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
    },
    {
      "name": "CVE-2022-21452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
    },
    {
      "name": "CVE-2021-20266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2021-3521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
    },
    {
      "name": "CVE-2021-4122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2022-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
    },
    {
      "name": "CVE-2022-21537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
    },
    {
      "name": "CVE-2022-21455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
    },
    {
      "name": "CVE-2022-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
    },
    {
      "name": "CVE-2022-21528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
    },
    {
      "name": "CVE-2022-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
    },
    {
      "name": "CVE-2022-21531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
    },
    {
      "name": "CVE-2022-21515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
    },
    {
      "name": "CVE-2022-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
    },
    {
      "name": "CVE-2022-21527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
    },
    {
      "name": "CVE-2022-21517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
    },
    {
      "name": "CVE-2022-21539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
    },
    {
      "name": "CVE-2022-21556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
    },
    {
      "name": "CVE-2022-21509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
    },
    {
      "name": "CVE-2022-21553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
    },
    {
      "name": "CVE-2022-21530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
    },
    {
      "name": "CVE-2022-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
    },
    {
      "name": "CVE-2022-21547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
    },
    {
      "name": "CVE-2022-21569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
    },
    {
      "name": "CVE-2022-21526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2022-0396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2012-5783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2023-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
    },
    {
      "name": "CVE-2023-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
    },
    {
      "name": "CVE-2023-21879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
    },
    {
      "name": "CVE-2023-21880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
    },
    {
      "name": "CVE-2023-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
    },
    {
      "name": "CVE-2023-21872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
    },
    {
      "name": "CVE-2023-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
    },
    {
      "name": "CVE-2023-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
    },
    {
      "name": "CVE-2023-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
    },
    {
      "name": "CVE-2023-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
    },
    {
      "name": "CVE-2023-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
    },
    {
      "name": "CVE-2023-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2023-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
    },
    {
      "name": "CVE-2023-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
    },
    {
      "name": "CVE-2023-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
    },
    {
      "name": "CVE-2023-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
    },
    {
      "name": "CVE-2023-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
    },
    {
      "name": "CVE-2023-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
    },
    {
      "name": "CVE-2023-21874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
    },
    {
      "name": "CVE-2023-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-4415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2023-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-20873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
    },
    {
      "name": "CVE-2023-20883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2022-46908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
    },
    {
      "name": "CVE-2023-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
    },
    {
      "name": "CVE-2022-4899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2023-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
    },
    {
      "name": "CVE-2023-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
    },
    {
      "name": "CVE-2023-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
    },
    {
      "name": "CVE-2023-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
    },
    {
      "name": "CVE-2023-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
    },
    {
      "name": "CVE-2023-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
    },
    {
      "name": "CVE-2023-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
    },
    {
      "name": "CVE-2023-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
    },
    {
      "name": "CVE-2023-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
    },
    {
      "name": "CVE-2023-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
    },
    {
      "name": "CVE-2023-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
    },
    {
      "name": "CVE-2023-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2021-22570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2023-2602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2023-34055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2022-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2022-48522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-33294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2021-20193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2022-27772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-6481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2007-4559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
    },
    {
      "name": "CVE-2023-3138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2023-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-4030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2024-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
    },
    {
      "name": "CVE-2024-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2024-28835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-38807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2023-5841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
    },
    {
      "name": "CVE-2024-34459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2024-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
    },
    {
      "name": "CVE-2024-21194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
    },
    {
      "name": "CVE-2024-21196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
    },
    {
      "name": "CVE-2024-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
    },
    {
      "name": "CVE-2024-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
    },
    {
      "name": "CVE-2024-21199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
    },
    {
      "name": "CVE-2024-21201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
    },
    {
      "name": "CVE-2024-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
    },
    {
      "name": "CVE-2024-21209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
    },
    {
      "name": "CVE-2024-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
    },
    {
      "name": "CVE-2024-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
    },
    {
      "name": "CVE-2024-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
    },
    {
      "name": "CVE-2024-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
    },
    {
      "name": "CVE-2024-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
    },
    {
      "name": "CVE-2024-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-10487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
    },
    {
      "name": "CVE-2024-10458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
    },
    {
      "name": "CVE-2024-10459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
    },
    {
      "name": "CVE-2024-10460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
    },
    {
      "name": "CVE-2024-10461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
    },
    {
      "name": "CVE-2024-10462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
    },
    {
      "name": "CVE-2024-10463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
    },
    {
      "name": "CVE-2024-10464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
    },
    {
      "name": "CVE-2024-10465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
    },
    {
      "name": "CVE-2024-10466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
    },
    {
      "name": "CVE-2024-10467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
    },
    {
      "name": "CVE-2024-10468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-11395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-11691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
    },
    {
      "name": "CVE-2024-11692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
    },
    {
      "name": "CVE-2024-11693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
    },
    {
      "name": "CVE-2024-11694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
    },
    {
      "name": "CVE-2024-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
    },
    {
      "name": "CVE-2024-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
    },
    {
      "name": "CVE-2024-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
    },
    {
      "name": "CVE-2024-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
    },
    {
      "name": "CVE-2024-11699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
    },
    {
      "name": "CVE-2024-11700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
    },
    {
      "name": "CVE-2024-11701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
    },
    {
      "name": "CVE-2024-11702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
    },
    {
      "name": "CVE-2024-11703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
    },
    {
      "name": "CVE-2024-11704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
    },
    {
      "name": "CVE-2024-11705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
    },
    {
      "name": "CVE-2024-11706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
    },
    {
      "name": "CVE-2024-11708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2024-47554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2025-0237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
    },
    {
      "name": "CVE-2025-0238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
    },
    {
      "name": "CVE-2025-0239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
    },
    {
      "name": "CVE-2025-0240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
    },
    {
      "name": "CVE-2025-0241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
    },
    {
      "name": "CVE-2025-0242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
    },
    {
      "name": "CVE-2025-0243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
    },
    {
      "name": "CVE-2025-0245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
    },
    {
      "name": "CVE-2025-0247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
    },
    {
      "name": "CVE-2025-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
    },
    {
      "name": "CVE-2025-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
    },
    {
      "name": "CVE-2025-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
    },
    {
      "name": "CVE-2025-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
    },
    {
      "name": "CVE-2025-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
    },
    {
      "name": "CVE-2025-0439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
    },
    {
      "name": "CVE-2025-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
    },
    {
      "name": "CVE-2025-0441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
    },
    {
      "name": "CVE-2025-0442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
    },
    {
      "name": "CVE-2025-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
    },
    {
      "name": "CVE-2025-0446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
    },
    {
      "name": "CVE-2025-0447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
    },
    {
      "name": "CVE-2025-0448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-0612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
    },
    {
      "name": "CVE-2025-0445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
    },
    {
      "name": "CVE-2025-0451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
    },
    {
      "name": "CVE-2025-0762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
    },
    {
      "name": "CVE-2025-1009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
    },
    {
      "name": "CVE-2025-1010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
    },
    {
      "name": "CVE-2025-1011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
    },
    {
      "name": "CVE-2025-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
    },
    {
      "name": "CVE-2025-1013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
    },
    {
      "name": "CVE-2025-1014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2025-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
    },
    {
      "name": "CVE-2025-1017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
    },
    {
      "name": "CVE-2025-1018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
    },
    {
      "name": "CVE-2025-1019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
    },
    {
      "name": "CVE-2025-1020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-47535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-0995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
    },
    {
      "name": "CVE-2025-0996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
    },
    {
      "name": "CVE-2025-0997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
    },
    {
      "name": "CVE-2025-0998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
    },
    {
      "name": "CVE-2025-0999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
    },
    {
      "name": "CVE-2025-1006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
    },
    {
      "name": "CVE-2025-1426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-39017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2025-1914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
    },
    {
      "name": "CVE-2025-1915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
    },
    {
      "name": "CVE-2025-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
    },
    {
      "name": "CVE-2025-1917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
    },
    {
      "name": "CVE-2025-1918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
    },
    {
      "name": "CVE-2025-1919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
    },
    {
      "name": "CVE-2025-1921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
    },
    {
      "name": "CVE-2025-1922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
    },
    {
      "name": "CVE-2025-1923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
    },
    {
      "name": "CVE-2025-1930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
    },
    {
      "name": "CVE-2025-1931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
    },
    {
      "name": "CVE-2025-1932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
    },
    {
      "name": "CVE-2025-1933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
    },
    {
      "name": "CVE-2025-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
    },
    {
      "name": "CVE-2025-1935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
    },
    {
      "name": "CVE-2025-1936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
    },
    {
      "name": "CVE-2025-1937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
    },
    {
      "name": "CVE-2025-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
    },
    {
      "name": "CVE-2025-1939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
    },
    {
      "name": "CVE-2025-1940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
    },
    {
      "name": "CVE-2025-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
    },
    {
      "name": "CVE-2025-1942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
    },
    {
      "name": "CVE-2025-1943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
    },
    {
      "name": "CVE-2025-1920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
    },
    {
      "name": "CVE-2025-2135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
    },
    {
      "name": "CVE-2025-2136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
    },
    {
      "name": "CVE-2025-2137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
    },
    {
      "name": "CVE-2025-24813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
    },
    {
      "name": "CVE-2024-45772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
    },
    {
      "name": "CVE-2025-2476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
    },
    {
      "name": "CVE-2025-2857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2025-2783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2025-3066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
    },
    {
      "name": "CVE-2025-3067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
    },
    {
      "name": "CVE-2025-3068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
    },
    {
      "name": "CVE-2025-3071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
    },
    {
      "name": "CVE-2025-3072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
    },
    {
      "name": "CVE-2025-3073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
    },
    {
      "name": "CVE-2025-3074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
    },
    {
      "name": "CVE-2025-3028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
    },
    {
      "name": "CVE-2025-3029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
    },
    {
      "name": "CVE-2025-3030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
    },
    {
      "name": "CVE-2025-3031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
    },
    {
      "name": "CVE-2025-3032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
    },
    {
      "name": "CVE-2025-3033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
    },
    {
      "name": "CVE-2025-3034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
    },
    {
      "name": "CVE-2025-3035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
    },
    {
      "name": "CVE-2025-21574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
    },
    {
      "name": "CVE-2025-21575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
    },
    {
      "name": "CVE-2025-21577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
    },
    {
      "name": "CVE-2025-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
    },
    {
      "name": "CVE-2025-21580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
    },
    {
      "name": "CVE-2025-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
    },
    {
      "name": "CVE-2025-21584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
    },
    {
      "name": "CVE-2025-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
    },
    {
      "name": "CVE-2025-21588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
    },
    {
      "name": "CVE-2025-30681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
    },
    {
      "name": "CVE-2025-30682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
    },
    {
      "name": "CVE-2025-30683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
    },
    {
      "name": "CVE-2025-30684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
    },
    {
      "name": "CVE-2025-30685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
    },
    {
      "name": "CVE-2025-30687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
    },
    {
      "name": "CVE-2025-30688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
    },
    {
      "name": "CVE-2025-30689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
    },
    {
      "name": "CVE-2025-30693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
    },
    {
      "name": "CVE-2025-30695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
    },
    {
      "name": "CVE-2025-30696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
    },
    {
      "name": "CVE-2025-30699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
    },
    {
      "name": "CVE-2025-30703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
    },
    {
      "name": "CVE-2025-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
    },
    {
      "name": "CVE-2025-30705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
    },
    {
      "name": "CVE-2025-30715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
    },
    {
      "name": "CVE-2025-30721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
    },
    {
      "name": "CVE-2025-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2024-12801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-4050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
    },
    {
      "name": "CVE-2025-4051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
    },
    {
      "name": "CVE-2025-4052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
    },
    {
      "name": "CVE-2025-4096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
    },
    {
      "name": "CVE-2025-2817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
    },
    {
      "name": "CVE-2025-4082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
    },
    {
      "name": "CVE-2025-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
    },
    {
      "name": "CVE-2025-4085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
    },
    {
      "name": "CVE-2025-4087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
    },
    {
      "name": "CVE-2025-4088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
    },
    {
      "name": "CVE-2025-4089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
    },
    {
      "name": "CVE-2025-4090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
    },
    {
      "name": "CVE-2025-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
    },
    {
      "name": "CVE-2025-4092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2025-29087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
    },
    {
      "name": "CVE-2025-3277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
    },
    {
      "name": "CVE-2025-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
    },
    {
      "name": "CVE-2025-4664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
    },
    {
      "name": "CVE-2025-4372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-4918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
    },
    {
      "name": "CVE-2025-4919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
    },
    {
      "name": "CVE-2025-41232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
    },
    {
      "name": "CVE-2025-23165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
    },
    {
      "name": "CVE-2025-23166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
    },
    {
      "name": "CVE-2025-5063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
    },
    {
      "name": "CVE-2025-5064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
    },
    {
      "name": "CVE-2025-5065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
    },
    {
      "name": "CVE-2025-5066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
    },
    {
      "name": "CVE-2025-5067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-5263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
    },
    {
      "name": "CVE-2025-5264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
    },
    {
      "name": "CVE-2025-5265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
    },
    {
      "name": "CVE-2025-5266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
    },
    {
      "name": "CVE-2025-5267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
    },
    {
      "name": "CVE-2025-5268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
    },
    {
      "name": "CVE-2025-5270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
    },
    {
      "name": "CVE-2025-5271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
    },
    {
      "name": "CVE-2025-5272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
    },
    {
      "name": "CVE-2025-5281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
    },
    {
      "name": "CVE-2025-5283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-5068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
    },
    {
      "name": "CVE-2025-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2025-49709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
    },
    {
      "name": "CVE-2025-49710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-56433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-29088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2025-5958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
    },
    {
      "name": "CVE-2025-5959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
    },
    {
      "name": "CVE-2025-41234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2025-6191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
    },
    {
      "name": "CVE-2025-6192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2023-42366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
    },
    {
      "name": "CVE-2025-6424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
    },
    {
      "name": "CVE-2025-6425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
    },
    {
      "name": "CVE-2025-6426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
    },
    {
      "name": "CVE-2025-6427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
    },
    {
      "name": "CVE-2025-6429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
    },
    {
      "name": "CVE-2025-6430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
    },
    {
      "name": "CVE-2025-6432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
    },
    {
      "name": "CVE-2025-6433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
    },
    {
      "name": "CVE-2025-6434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-6555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
    },
    {
      "name": "CVE-2025-6556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
    },
    {
      "name": "CVE-2025-6557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
    },
    {
      "name": "CVE-2025-6435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
    },
    {
      "name": "CVE-2025-6436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
    },
    {
      "name": "CVE-2025-6554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2024-47081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2025-47268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
    },
    {
      "name": "CVE-2025-7657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-30754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2025-50088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2020-16156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
    },
    {
      "name": "CVE-2025-8010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
    },
    {
      "name": "CVE-2025-8011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
    },
    {
      "name": "CVE-2025-8027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
    },
    {
      "name": "CVE-2025-8028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
    },
    {
      "name": "CVE-2025-8029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
    },
    {
      "name": "CVE-2025-8030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
    },
    {
      "name": "CVE-2025-8031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
    },
    {
      "name": "CVE-2025-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
    },
    {
      "name": "CVE-2025-8033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
    },
    {
      "name": "CVE-2025-8034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
    },
    {
      "name": "CVE-2025-8035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
    },
    {
      "name": "CVE-2025-8036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
    },
    {
      "name": "CVE-2025-8037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
    },
    {
      "name": "CVE-2025-8038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
    },
    {
      "name": "CVE-2025-8039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
    },
    {
      "name": "CVE-2025-8040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
    },
    {
      "name": "CVE-2025-8041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
    },
    {
      "name": "CVE-2025-8043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
    },
    {
      "name": "CVE-2025-8044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-45339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-8292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2025-5889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
    },
    {
      "name": "CVE-2025-8576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
    },
    {
      "name": "CVE-2025-8577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
    },
    {
      "name": "CVE-2025-8578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
    },
    {
      "name": "CVE-2025-8579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
    },
    {
      "name": "CVE-2025-8580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
    },
    {
      "name": "CVE-2025-8581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
    },
    {
      "name": "CVE-2025-8582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
    },
    {
      "name": "CVE-2025-8583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
    },
    {
      "name": "CVE-2025-27210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
    },
    {
      "name": "CVE-2025-27817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
    },
    {
      "name": "CVE-2025-27818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
    },
    {
      "name": "CVE-2025-8879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
    },
    {
      "name": "CVE-2025-8880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
    },
    {
      "name": "CVE-2025-8881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
    },
    {
      "name": "CVE-2025-8882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
    },
    {
      "name": "CVE-2025-8901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
    },
    {
      "name": "CVE-2025-48989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
    },
    {
      "name": "CVE-2025-7339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
    },
    {
      "name": "CVE-2025-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2024-25260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
    },
    {
      "name": "CVE-2025-1371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
    },
    {
      "name": "CVE-2025-1376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
    },
    {
      "name": "CVE-2025-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-48964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2025-41242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
    },
    {
      "name": "CVE-2025-9132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2024-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
    },
    {
      "name": "CVE-2025-55668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2005-2541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
    },
    {
      "name": "CVE-2008-5727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
    },
    {
      "name": "CVE-2008-5728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
    },
    {
      "name": "CVE-2008-5729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
    },
    {
      "name": "CVE-2008-5730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
    },
    {
      "name": "CVE-2008-5742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
    },
    {
      "name": "CVE-2011-3374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
    },
    {
      "name": "CVE-2014-4715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
    },
    {
      "name": "CVE-2015-2214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
    },
    {
      "name": "CVE-2016-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
    },
    {
      "name": "CVE-2016-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
    },
    {
      "name": "CVE-2016-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
    },
    {
      "name": "CVE-2016-0694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
    },
    {
      "name": "CVE-2016-2149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
    },
    {
      "name": "CVE-2016-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
    },
    {
      "name": "CVE-2016-3418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
    },
    {
      "name": "CVE-2017-10140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
    },
    {
      "name": "CVE-2017-12195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
    },
    {
      "name": "CVE-2017-12629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
    },
    {
      "name": "CVE-2017-3604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
    },
    {
      "name": "CVE-2017-3605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
    },
    {
      "name": "CVE-2017-3606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
    },
    {
      "name": "CVE-2017-3607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
    },
    {
      "name": "CVE-2017-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
    },
    {
      "name": "CVE-2017-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
    },
    {
      "name": "CVE-2017-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
    },
    {
      "name": "CVE-2017-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
    },
    {
      "name": "CVE-2017-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
    },
    {
      "name": "CVE-2017-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
    },
    {
      "name": "CVE-2017-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
    },
    {
      "name": "CVE-2017-3615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
    },
    {
      "name": "CVE-2017-3616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
    },
    {
      "name": "CVE-2017-3617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
    },
    {
      "name": "CVE-2018-1000169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
    },
    {
      "name": "CVE-2018-1196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
    },
    {
      "name": "CVE-2018-1273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
    },
    {
      "name": "CVE-2019-10782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
    },
    {
      "name": "CVE-2019-9658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
    },
    {
      "name": "CVE-2020-2981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
    },
    {
      "name": "CVE-2021-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
    },
    {
      "name": "CVE-2021-20304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
    },
    {
      "name": "CVE-2021-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
    },
    {
      "name": "CVE-2021-23169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
    },
    {
      "name": "CVE-2021-3236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
    },
    {
      "name": "CVE-2022-0635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
    },
    {
      "name": "CVE-2022-0667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
    },
    {
      "name": "CVE-2022-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
    },
    {
      "name": "CVE-2022-39046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
    },
    {
      "name": "CVE-2022-42010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
    },
    {
      "name": "CVE-2022-42011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
    },
    {
      "name": "CVE-2022-42012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
    },
    {
      "name": "CVE-2022-44638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
    },
    {
      "name": "CVE-2023-31437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
    },
    {
      "name": "CVE-2023-31438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
    },
    {
      "name": "CVE-2023-31439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
    },
    {
      "name": "CVE-2023-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
    },
    {
      "name": "CVE-2023-39810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
    },
    {
      "name": "CVE-2023-4156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
    },
    {
      "name": "CVE-2023-4320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
    },
    {
      "name": "CVE-2023-43785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
    },
    {
      "name": "CVE-2023-43786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
    },
    {
      "name": "CVE-2023-43787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
    },
    {
      "name": "CVE-2023-46129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
    },
    {
      "name": "CVE-2023-47039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
    },
    {
      "name": "CVE-2023-5189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
    },
    {
      "name": "CVE-2024-11584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
    },
    {
      "name": "CVE-2024-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
    },
    {
      "name": "CVE-2024-22047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
    },
    {
      "name": "CVE-2024-2397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
    },
    {
      "name": "CVE-2024-26462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
    },
    {
      "name": "CVE-2024-31047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
    },
    {
      "name": "CVE-2024-3220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
    },
    {
      "name": "CVE-2024-58251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
    },
    {
      "name": "CVE-2024-6174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
    },
    {
      "name": "CVE-2024-7012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
    },
    {
      "name": "CVE-2025-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
    },
    {
      "name": "CVE-2025-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
    },
    {
      "name": "CVE-2025-1372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
    },
    {
      "name": "CVE-2025-24294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
    },
    {
      "name": "CVE-2025-26519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2025-30258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
    },
    {
      "name": "CVE-2025-31672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
    },
    {
      "name": "CVE-2025-45582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
    },
    {
      "name": "CVE-2025-45768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
    },
    {
      "name": "CVE-2025-46392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
    },
    {
      "name": "CVE-2025-46394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-5278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-6170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
    },
    {
      "name": "CVE-2025-6297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
    },
    {
      "name": "CVE-2025-7962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-8262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
    },
    {
      "name": "CVE-2025-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
    },
    {
      "name": "CVE-2025-8885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
    },
    {
      "name": "CVE-2025-8916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
    },
    {
      "name": "CVE-2025-9179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
    },
    {
      "name": "CVE-2025-9180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
    },
    {
      "name": "CVE-2025-9181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
    },
    {
      "name": "CVE-2025-9182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
    },
    {
      "name": "CVE-2025-9183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
    },
    {
      "name": "CVE-2025-9184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
    },
    {
      "name": "CVE-2025-9185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
    },
    {
      "name": "CVE-2025-9187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
    },
    {
      "name": "CVE-2025-9308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0756",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
    }
  ]
}
  CERTFR-2025-AVI-0641
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Enterprise Security | Enterprise Security versions antérieures à 8.1.0 | ||
| Splunk | Splunk User Behavior Analytics (UBA) | User Behavior Analytics (UBA) versions antérieures à 5.4.3 | 
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Enterprise Security versions ant\u00e9rieures \u00e0 8.1.0",
      "product": {
        "name": "Enterprise Security",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "User Behavior Analytics (UBA) versions ant\u00e9rieures \u00e0 5.4.3",
      "product": {
        "name": "Splunk User Behavior Analytics (UBA)",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2024-42459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-5590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5590"
    },
    {
      "name": "CVE-2024-49766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
    },
    {
      "name": "CVE-2024-42460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2024-31141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
    },
    {
      "name": "CVE-2022-33987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33987"
    },
    {
      "name": "CVE-2024-40635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
    },
    {
      "name": "CVE-2024-48948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
    },
    {
      "name": "CVE-2025-25977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25977"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2024-56128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56128"
    },
    {
      "name": "CVE-2022-42898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-12254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-42461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
    },
    {
      "name": "CVE-2025-21502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
    },
    {
      "name": "CVE-2023-38039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    }
  ],
  "initial_release_date": "2025-07-31T00:00:00",
  "last_revision_date": "2025-07-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0641",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0715",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0715"
    },
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0713",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0713"
    },
    {
      "published_at": "2025-07-30",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0714",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0714"
    }
  ]
}
  CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Greenplum Data Copy Utility  versions ant\u00e9rieures \u00e0  2.8.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres sur Kubernetes  versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum Command Center  versions ant\u00e9rieures \u00e0  6.14.0 et 7.4.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum Backup and Restore  versions ant\u00e9rieures \u00e0  1.31.1",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum Streaming Server  versions ant\u00e9rieures \u00e0  2.1.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum  versions 6.x ant\u00e9rieures \u00e0  6.29.1",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Greenplum  versions 7.x ant\u00e9rieures \u00e0  7.5.0",
      "product": {
        "name": "Tanzu Greenplum",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Tanzu pour Valkey sur Kubernetes  versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2019-2126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2019-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
    },
    {
      "name": "CVE-2022-30633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
    },
    {
      "name": "CVE-2022-1705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
    },
    {
      "name": "CVE-2022-27664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
    },
    {
      "name": "CVE-2022-28131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
    },
    {
      "name": "CVE-2022-32148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
    },
    {
      "name": "CVE-2022-32189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
    },
    {
      "name": "CVE-2022-1962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
    },
    {
      "name": "CVE-2022-30635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
    },
    {
      "name": "CVE-2022-30631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
    },
    {
      "name": "CVE-2022-30632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
    },
    {
      "name": "CVE-2022-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
    },
    {
      "name": "CVE-2022-29526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
    },
    {
      "name": "CVE-2021-45943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
    },
    {
      "name": "CVE-2021-34141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
    },
    {
      "name": "CVE-2022-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2022-41862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
    },
    {
      "name": "CVE-2022-41717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2022-30629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
    },
    {
      "name": "CVE-2022-41723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
    },
    {
      "name": "CVE-2022-30580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
    },
    {
      "name": "CVE-2022-40898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
    },
    {
      "name": "CVE-2022-41725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
    },
    {
      "name": "CVE-2022-41724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
    },
    {
      "name": "CVE-2023-24532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
    },
    {
      "name": "CVE-2023-24537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
    },
    {
      "name": "CVE-2023-2455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-24536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
    },
    {
      "name": "CVE-2023-24538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
    },
    {
      "name": "CVE-2023-1255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
    },
    {
      "name": "CVE-2023-24540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
    },
    {
      "name": "CVE-2023-29400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
    },
    {
      "name": "CVE-2023-24539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
    },
    {
      "name": "CVE-2023-2975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2023-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
    },
    {
      "name": "CVE-2023-29402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
    },
    {
      "name": "CVE-2023-29403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
    },
    {
      "name": "CVE-2023-29405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2023-29406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
    },
    {
      "name": "CVE-2023-32681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-4752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-5870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
    },
    {
      "name": "CVE-2022-0543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-24534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2024-1580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2023-45285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-45289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
    },
    {
      "name": "CVE-2023-45290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
    },
    {
      "name": "CVE-2024-24783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
    },
    {
      "name": "CVE-2024-24784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
    },
    {
      "name": "CVE-2024-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2024-23807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-22667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
    },
    {
      "name": "CVE-2023-6228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
    },
    {
      "name": "CVE-2023-45287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
    },
    {
      "name": "CVE-2024-24787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
    },
    {
      "name": "CVE-2024-24788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
    },
    {
      "name": "CVE-2024-7348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
    },
    {
      "name": "CVE-2023-7008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2022-48468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
    },
    {
      "name": "CVE-2023-48161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-10976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
    },
    {
      "name": "CVE-2024-10977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
    },
    {
      "name": "CVE-2024-10978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
    },
    {
      "name": "CVE-2024-10979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2025-21490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
    },
    {
      "name": "CVE-2025-21491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
    },
    {
      "name": "CVE-2025-21497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
    },
    {
      "name": "CVE-2025-21500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
    },
    {
      "name": "CVE-2025-21501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
    },
    {
      "name": "CVE-2025-21503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
    },
    {
      "name": "CVE-2025-21505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
    },
    {
      "name": "CVE-2025-21519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
    },
    {
      "name": "CVE-2025-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
    },
    {
      "name": "CVE-2025-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
    },
    {
      "name": "CVE-2025-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
    },
    {
      "name": "CVE-2025-21555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
    },
    {
      "name": "CVE-2025-21559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2024-24791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
    },
    {
      "name": "CVE-2023-24531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
    },
    {
      "name": "CVE-2024-45336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
    },
    {
      "name": "CVE-2024-45341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
    },
    {
      "name": "CVE-2025-22866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2022-42967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-31650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
    },
    {
      "name": "CVE-2025-31651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-27363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2012-0880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
    },
    {
      "name": "CVE-2017-17507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
    },
    {
      "name": "CVE-2017-8806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
    },
    {
      "name": "CVE-2018-10126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
    },
    {
      "name": "CVE-2018-11205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
    },
    {
      "name": "CVE-2018-13866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
    },
    {
      "name": "CVE-2018-13867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
    },
    {
      "name": "CVE-2018-13868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
    },
    {
      "name": "CVE-2018-13869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
    },
    {
      "name": "CVE-2018-13870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
    },
    {
      "name": "CVE-2018-13871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
    },
    {
      "name": "CVE-2018-13872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
    },
    {
      "name": "CVE-2018-13874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
    },
    {
      "name": "CVE-2018-13875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
    },
    {
      "name": "CVE-2018-13876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
    },
    {
      "name": "CVE-2018-14031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
    },
    {
      "name": "CVE-2018-14033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
    },
    {
      "name": "CVE-2018-14034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
    },
    {
      "name": "CVE-2018-14035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
    },
    {
      "name": "CVE-2018-14460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
    },
    {
      "name": "CVE-2018-15671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
    },
    {
      "name": "CVE-2018-16438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
    },
    {
      "name": "CVE-2018-17432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
    },
    {
      "name": "CVE-2018-17433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
    },
    {
      "name": "CVE-2018-17434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
    },
    {
      "name": "CVE-2018-17435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
    },
    {
      "name": "CVE-2018-17436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
    },
    {
      "name": "CVE-2018-17437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
    },
    {
      "name": "CVE-2018-17438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
    },
    {
      "name": "CVE-2018-17439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
    },
    {
      "name": "CVE-2019-20005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
    },
    {
      "name": "CVE-2019-20006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
    },
    {
      "name": "CVE-2019-20007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
    },
    {
      "name": "CVE-2019-20198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
    },
    {
      "name": "CVE-2019-20199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
    },
    {
      "name": "CVE-2019-20200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
    },
    {
      "name": "CVE-2019-20201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
    },
    {
      "name": "CVE-2019-20202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
    },
    {
      "name": "CVE-2019-6988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
    },
    {
      "name": "CVE-2019-8396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
    },
    {
      "name": "CVE-2019-8397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
    },
    {
      "name": "CVE-2019-8398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
    },
    {
      "name": "CVE-2019-9151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
    },
    {
      "name": "CVE-2019-9152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
    },
    {
      "name": "CVE-2020-10809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
    },
    {
      "name": "CVE-2020-10810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
    },
    {
      "name": "CVE-2020-10811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
    },
    {
      "name": "CVE-2020-10812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
    },
    {
      "name": "CVE-2020-18232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
    },
    {
      "name": "CVE-2020-18494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
    },
    {
      "name": "CVE-2021-26220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
    },
    {
      "name": "CVE-2021-26221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
    },
    {
      "name": "CVE-2021-26222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
    },
    {
      "name": "CVE-2021-30485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
    },
    {
      "name": "CVE-2021-31229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
    },
    {
      "name": "CVE-2021-31347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
    },
    {
      "name": "CVE-2021-31348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
    },
    {
      "name": "CVE-2021-31598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
    },
    {
      "name": "CVE-2021-33430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
    },
    {
      "name": "CVE-2021-37501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
    },
    {
      "name": "CVE-2021-45829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
    },
    {
      "name": "CVE-2021-45830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
    },
    {
      "name": "CVE-2021-45832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
    },
    {
      "name": "CVE-2021-45833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
    },
    {
      "name": "CVE-2021-46242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
    },
    {
      "name": "CVE-2021-46243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
    },
    {
      "name": "CVE-2021-46244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
    },
    {
      "name": "CVE-2022-25942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
    },
    {
      "name": "CVE-2022-25972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
    },
    {
      "name": "CVE-2022-26061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
    },
    {
      "name": "CVE-2022-30045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
    },
    {
      "name": "CVE-2022-4055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
    },
    {
      "name": "CVE-2022-47655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
    },
    {
      "name": "CVE-2023-0996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
    },
    {
      "name": "CVE-2023-29659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
    },
    {
      "name": "CVE-2023-32570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
    },
    {
      "name": "CVE-2023-39328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
    },
    {
      "name": "CVE-2023-39329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
    },
    {
      "name": "CVE-2023-51792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
    },
    {
      "name": "CVE-2023-6879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
    },
    {
      "name": "CVE-2024-27304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
    },
    {
      "name": "CVE-2024-29157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
    },
    {
      "name": "CVE-2024-29158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
    },
    {
      "name": "CVE-2024-29159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
    },
    {
      "name": "CVE-2024-29160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
    },
    {
      "name": "CVE-2024-29161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
    },
    {
      "name": "CVE-2024-29162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
    },
    {
      "name": "CVE-2024-29163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
    },
    {
      "name": "CVE-2024-29164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
    },
    {
      "name": "CVE-2024-29165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
    },
    {
      "name": "CVE-2024-29166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
    },
    {
      "name": "CVE-2024-32605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
    },
    {
      "name": "CVE-2024-32606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
    },
    {
      "name": "CVE-2024-32607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
    },
    {
      "name": "CVE-2024-32608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
    },
    {
      "name": "CVE-2024-32609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
    },
    {
      "name": "CVE-2024-32610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
    },
    {
      "name": "CVE-2024-32611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
    },
    {
      "name": "CVE-2024-32612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
    },
    {
      "name": "CVE-2024-32613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
    },
    {
      "name": "CVE-2024-32614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
    },
    {
      "name": "CVE-2024-32615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
    },
    {
      "name": "CVE-2024-32616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
    },
    {
      "name": "CVE-2024-32617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
    },
    {
      "name": "CVE-2024-32618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
    },
    {
      "name": "CVE-2024-32619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
    },
    {
      "name": "CVE-2024-32620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
    },
    {
      "name": "CVE-2024-32621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
    },
    {
      "name": "CVE-2024-32622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
    },
    {
      "name": "CVE-2024-32623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
    },
    {
      "name": "CVE-2024-32624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
    },
    {
      "name": "CVE-2024-33873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
    },
    {
      "name": "CVE-2024-33874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
    },
    {
      "name": "CVE-2024-33875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
    },
    {
      "name": "CVE-2024-33876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
    },
    {
      "name": "CVE-2024-33877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
    },
    {
      "name": "CVE-2024-34402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
    },
    {
      "name": "CVE-2024-34403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
    },
    {
      "name": "CVE-2024-38949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
    },
    {
      "name": "CVE-2024-38950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
    },
    {
      "name": "CVE-2024-41996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
    },
    {
      "name": "CVE-2024-45993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
    },
    {
      "name": "CVE-2024-46981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
    },
    {
      "name": "CVE-2024-49203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
    },
    {
      "name": "CVE-2024-5171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
    },
    {
      "name": "CVE-2024-51741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
    },
    {
      "name": "CVE-2024-52522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
    },
    {
      "name": "CVE-2024-52616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2024-53920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
    },
    {
      "name": "CVE-2024-56378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2024-56826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
    },
    {
      "name": "CVE-2024-56827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
    },
    {
      "name": "CVE-2024-6716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
    },
    {
      "name": "CVE-2025-2153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-23022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
    },
    {
      "name": "CVE-2025-24528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    }
  ],
  "initial_release_date": "2025-06-19T00:00:00",
  "last_revision_date": "2025-06-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0524",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
  "vendor_advisories": [
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
    },
    {
      "published_at": "2025-06-18",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
    }
  ]
}
  msrc_cve-2024-26461
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-26461 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c. - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-26461.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
    "tracking": {
      "current_release_date": "2024-09-11T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T01:03:24.900Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-26461",
      "initial_release_date": "2024-02-02T08:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-08-05T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2024-08-15T00:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Information published."
        },
        {
          "date": "2024-08-16T00:00:00.000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Information published."
        },
        {
          "date": "2024-08-17T00:00:00.000Z",
          "legacy_version": "1.3",
          "number": "4",
          "summary": "Information published."
        },
        {
          "date": "2024-08-18T00:00:00.000Z",
          "legacy_version": "1.4",
          "number": "5",
          "summary": "Information published."
        },
        {
          "date": "2024-08-19T00:00:00.000Z",
          "legacy_version": "1.5",
          "number": "6",
          "summary": "Information published."
        },
        {
          "date": "2024-08-20T00:00:00.000Z",
          "legacy_version": "1.6",
          "number": "7",
          "summary": "Information published."
        },
        {
          "date": "2024-08-21T00:00:00.000Z",
          "legacy_version": "1.7",
          "number": "8",
          "summary": "Information published."
        },
        {
          "date": "2024-08-22T00:00:00.000Z",
          "legacy_version": "1.8",
          "number": "9",
          "summary": "Information published."
        },
        {
          "date": "2024-08-23T00:00:00.000Z",
          "legacy_version": "1.9",
          "number": "10",
          "summary": "Information published."
        },
        {
          "date": "2024-08-24T00:00:00.000Z",
          "legacy_version": "2",
          "number": "11",
          "summary": "Information published."
        },
        {
          "date": "2024-08-25T00:00:00.000Z",
          "legacy_version": "2.1",
          "number": "12",
          "summary": "Information published."
        },
        {
          "date": "2024-08-26T00:00:00.000Z",
          "legacy_version": "2.2",
          "number": "13",
          "summary": "Information published."
        },
        {
          "date": "2024-08-27T00:00:00.000Z",
          "legacy_version": "2.3",
          "number": "14",
          "summary": "Information published."
        },
        {
          "date": "2024-08-28T00:00:00.000Z",
          "legacy_version": "2.4",
          "number": "15",
          "summary": "Information published."
        },
        {
          "date": "2024-08-29T00:00:00.000Z",
          "legacy_version": "2.5",
          "number": "16",
          "summary": "Information published."
        },
        {
          "date": "2024-08-30T00:00:00.000Z",
          "legacy_version": "2.6",
          "number": "17",
          "summary": "Information published."
        },
        {
          "date": "2024-08-31T00:00:00.000Z",
          "legacy_version": "2.7",
          "number": "18",
          "summary": "Information published."
        },
        {
          "date": "2024-09-01T00:00:00.000Z",
          "legacy_version": "2.8",
          "number": "19",
          "summary": "Information published."
        },
        {
          "date": "2024-09-02T00:00:00.000Z",
          "legacy_version": "2.9",
          "number": "20",
          "summary": "Information published."
        },
        {
          "date": "2024-09-03T00:00:00.000Z",
          "legacy_version": "3",
          "number": "21",
          "summary": "Information published."
        },
        {
          "date": "2024-09-05T00:00:00.000Z",
          "legacy_version": "3.1",
          "number": "22",
          "summary": "Information published."
        },
        {
          "date": "2024-09-06T00:00:00.000Z",
          "legacy_version": "3.2",
          "number": "23",
          "summary": "Information published."
        },
        {
          "date": "2024-09-07T00:00:00.000Z",
          "legacy_version": "3.3",
          "number": "24",
          "summary": "Information published."
        },
        {
          "date": "2024-09-08T00:00:00.000Z",
          "legacy_version": "3.4",
          "number": "25",
          "summary": "Information published."
        },
        {
          "date": "2024-09-11T00:00:00.000Z",
          "legacy_version": "3.5",
          "number": "26",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "26"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              },
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 krb5 1.21.3-1",
                "product": {
                  "name": "\u003cazl3 krb5 1.21.3-1",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 krb5 1.21.3-1",
                "product": {
                  "name": "azl3 krb5 1.21.3-1",
                  "product_id": "17703"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 krb5 1.19.4-3",
                "product": {
                  "name": "\u003ccbl2 krb5 1.19.4-3",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 krb5 1.19.4-3",
                "product": {
                  "name": "cbl2 krb5 1.19.4-3",
                  "product_id": "20083"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 krb5 1.21.2-1",
                "product": {
                  "name": "\u003cazl3 krb5 1.21.2-1",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 krb5 1.21.2-1",
                "product": {
                  "name": "azl3 krb5 1.21.2-1",
                  "product_id": "20087"
                }
              }
            ],
            "category": "product_name",
            "name": "krb5"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 krb5 1.21.3-1 as a component of Azure Linux 3.0",
          "product_id": "17084-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 krb5 1.21.3-1 as a component of Azure Linux 3.0",
          "product_id": "17703-17084"
        },
        "product_reference": "17703",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 krb5 1.19.4-3 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 krb5 1.19.4-3 as a component of CBL Mariner 2.0",
          "product_id": "20083-17086"
        },
        "product_reference": "20083",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 krb5 1.21.2-1 as a component of Azure Linux 3.0",
          "product_id": "17084-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 krb5 1.21.2-1 as a component of Azure Linux 3.0",
          "product_id": "20087-17084"
        },
        "product_reference": "20087",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "general",
          "text": "mitre",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17703-17084",
          "20083-17086",
          "20087-17084"
        ],
        "known_affected": [
          "17084-3",
          "17086-2",
          "17084-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26461 Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c. - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-26461.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-08-05T00:00:00.000Z",
          "details": "1.21.3-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-3",
            "17086-2",
            "17084-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "17084-3",
            "17086-2",
            "17084-1"
          ]
        }
      ],
      "title": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c."
    }
  ]
}
  suse-su-2024:1006-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for krb5",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).\n- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1006,SUSE-SLE-Micro-5.3-2024-1006,SUSE-SLE-Micro-5.4-2024-1006,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1006,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1006,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1006,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1006,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1006,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1006,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1006,openSUSE-Leap-Micro-5.3-2024-1006,openSUSE-Leap-Micro-5.4-2024-1006",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1006-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1006-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241006-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1006-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220770",
        "url": "https://bugzilla.suse.com/1220770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220771",
        "url": "https://bugzilla.suse.com/1220771"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      }
    ],
    "title": "Security update for krb5",
    "tracking": {
      "current_release_date": "2024-03-27T09:48:46Z",
      "generator": {
        "date": "2024-03-27T09:48:46Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1006-1",
      "initial_release_date": "2024-03-27T09:48:46Z",
      "revision_history": [
        {
          "date": "2024-03-27T09:48:46Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-client-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-client-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-devel-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-mini-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-mini-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-mini-devel-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150400.3.9.1.aarch64",
                "product": {
                  "name": "krb5-server-1.19.2-150400.3.9.1.aarch64",
                  "product_id": "krb5-server-1.19.2-150400.3.9.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-64bit-1.19.2-150400.3.9.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-64bit-1.19.2-150400.3.9.1.aarch64_ilp32",
                  "product_id": "krb5-64bit-1.19.2-150400.3.9.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-64bit-1.19.2-150400.3.9.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-devel-64bit-1.19.2-150400.3.9.1.aarch64_ilp32",
                  "product_id": "krb5-devel-64bit-1.19.2-150400.3.9.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-client-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-client-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-devel-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-devel-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-mini-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-mini-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-mini-devel-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150400.3.9.1.i586",
                "product": {
                  "name": "krb5-server-1.19.2-150400.3.9.1.i586",
                  "product_id": "krb5-server-1.19.2-150400.3.9.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-client-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-devel-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-mini-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-mini-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-mini-devel-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150400.3.9.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.19.2-150400.3.9.1.ppc64le",
                  "product_id": "krb5-server-1.19.2-150400.3.9.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-client-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-client-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-devel-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-devel-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-mini-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-mini-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-mini-devel-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150400.3.9.1.s390x",
                "product": {
                  "name": "krb5-server-1.19.2-150400.3.9.1.s390x",
                  "product_id": "krb5-server-1.19.2-150400.3.9.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-32bit-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-client-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-client-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-devel-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-mini-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-mini-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-mini-devel-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150400.3.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150400.3.9.1.x86_64",
                "product": {
                  "name": "krb5-server-1.19.2-150400.3.9.1.x86_64",
                  "product_id": "krb5-server-1.19.2-150400.3.9.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.3",
                "product": {
                  "name": "SUSE Manager Proxy 4.3",
                  "product_id": "SUSE Manager Proxy 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.3",
                "product": {
                  "name": "SUSE Manager Server 4.3",
                  "product_id": "SUSE Manager Server 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.3",
                "product": {
                  "name": "openSUSE Leap Micro 5.3",
                  "product_id": "openSUSE Leap Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.4",
                "product": {
                  "name": "openSUSE Leap Micro 5.4",
                  "product_id": "openSUSE Leap Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of openSUSE Leap Micro 5.3",
          "product_id": "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of openSUSE Leap Micro 5.3",
          "product_id": "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.aarch64 as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.s390x as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150400.3.9.1.x86_64 as component of openSUSE Leap Micro 5.4",
          "product_id": "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150400.3.9.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
          "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-27T09:48:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
          "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
          "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
          "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
          "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Proxy 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-32bit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-client-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-devel-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-kdb-ldap-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-otp-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-plugin-preauth-pkinit-1.19.2-150400.3.9.1.x86_64",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.ppc64le",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.s390x",
            "SUSE Manager Server 4.3:krb5-server-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.3:krb5-1.19.2-150400.3.9.1.x86_64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.aarch64",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.s390x",
            "openSUSE Leap Micro 5.4:krb5-1.19.2-150400.3.9.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-27T09:48:46Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26461"
    }
  ]
}
  suse-su-2024:0997-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for krb5",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).\n- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).\n- CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-997,SUSE-SLE-Micro-5.5-2024-997,SUSE-SLE-Module-Basesystem-15-SP5-2024-997,SUSE-SLE-Module-Server-Applications-15-SP5-2024-997,openSUSE-SLE-15.5-2024-997",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0997-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:0997-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240997-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:0997-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220770",
        "url": "https://bugzilla.suse.com/1220770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220771",
        "url": "https://bugzilla.suse.com/1220771"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220772",
        "url": "https://bugzilla.suse.com/1220772"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26462 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26462/"
      }
    ],
    "title": "Security update for krb5",
    "tracking": {
      "current_release_date": "2024-03-26T10:03:38Z",
      "generator": {
        "date": "2024-03-26T10:03:38Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:0997-1",
      "initial_release_date": "2024-03-26T10:03:38Z",
      "revision_history": [
        {
          "date": "2024-03-26T10:03:38Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-client-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-client-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-devel-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-mini-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-mini-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-mini-devel-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-mini-devel-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.20.1-150500.3.6.1.aarch64",
                "product": {
                  "name": "krb5-server-1.20.1-150500.3.6.1.aarch64",
                  "product_id": "krb5-server-1.20.1-150500.3.6.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-64bit-1.20.1-150500.3.6.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-64bit-1.20.1-150500.3.6.1.aarch64_ilp32",
                  "product_id": "krb5-64bit-1.20.1-150500.3.6.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-64bit-1.20.1-150500.3.6.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-devel-64bit-1.20.1-150500.3.6.1.aarch64_ilp32",
                  "product_id": "krb5-devel-64bit-1.20.1-150500.3.6.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-client-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-client-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-devel-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-devel-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-mini-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-mini-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-mini-devel-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-mini-devel-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.20.1-150500.3.6.1.i586",
                "product": {
                  "name": "krb5-server-1.20.1-150500.3.6.1.i586",
                  "product_id": "krb5-server-1.20.1-150500.3.6.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-client-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-devel-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-mini-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-mini-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-mini-devel-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-mini-devel-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.20.1-150500.3.6.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.20.1-150500.3.6.1.ppc64le",
                  "product_id": "krb5-server-1.20.1-150500.3.6.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-client-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-client-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-devel-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-devel-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-mini-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-mini-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-mini-devel-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-mini-devel-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.20.1-150500.3.6.1.s390x",
                "product": {
                  "name": "krb5-server-1.20.1-150500.3.6.1.s390x",
                  "product_id": "krb5-server-1.20.1-150500.3.6.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-32bit-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-client-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-client-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-devel-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-mini-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-mini-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-mini-devel-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-mini-devel-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.20.1-150500.3.6.1.x86_64",
                "product": {
                  "name": "krb5-server-1.20.1-150500.3.6.1.x86_64",
                  "product_id": "krb5-server-1.20.1-150500.3.6.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-client-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-devel-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.20.1-150500.3.6.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
        },
        "product_reference": "krb5-server-1.20.1-150500.3.6.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-26T10:03:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-26T10:03:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
          "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26462",
          "url": "https://www.suse.com/security/cve/CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26462",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220772 for CVE-2024-26462",
          "url": "https://bugzilla.suse.com/1220772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "SUSE Linux Enterprise Module for Server Applications 15 SP5:krb5-server-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-client-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-devel-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-devel-32bit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-otp-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-plugin-preauth-spake-1.20.1-150500.3.6.1.x86_64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.aarch64",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.ppc64le",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.s390x",
            "openSUSE Leap 15.5:krb5-server-1.20.1-150500.3.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-26T10:03:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26462"
    }
  ]
}
  suse-su-2024:1001-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for krb5",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).\n- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1001,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1001,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1001,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1001,SUSE-SUSE-MicroOS-5.1-2024-1001,SUSE-SUSE-MicroOS-5.2-2024-1001,SUSE-Storage-7.1-2024-1001",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1001-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1001-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241001-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1001-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220770",
        "url": "https://bugzilla.suse.com/1220770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220771",
        "url": "https://bugzilla.suse.com/1220771"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      }
    ],
    "title": "Security update for krb5",
    "tracking": {
      "current_release_date": "2024-03-27T00:48:41Z",
      "generator": {
        "date": "2024-03-27T00:48:41Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1001-1",
      "initial_release_date": "2024-03-27T00:48:41Z",
      "revision_history": [
        {
          "date": "2024-03-27T00:48:41Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-client-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-client-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-devel-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-mini-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-mini-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-mini-devel-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150300.16.1.aarch64",
                "product": {
                  "name": "krb5-server-1.19.2-150300.16.1.aarch64",
                  "product_id": "krb5-server-1.19.2-150300.16.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-64bit-1.19.2-150300.16.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-64bit-1.19.2-150300.16.1.aarch64_ilp32",
                  "product_id": "krb5-64bit-1.19.2-150300.16.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-64bit-1.19.2-150300.16.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-devel-64bit-1.19.2-150300.16.1.aarch64_ilp32",
                  "product_id": "krb5-devel-64bit-1.19.2-150300.16.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-client-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-client-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-devel-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-devel-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-mini-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-mini-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-mini-devel-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150300.16.1.i586",
                "product": {
                  "name": "krb5-server-1.19.2-150300.16.1.i586",
                  "product_id": "krb5-server-1.19.2-150300.16.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-client-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-devel-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-mini-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-mini-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-mini-devel-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150300.16.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.19.2-150300.16.1.ppc64le",
                  "product_id": "krb5-server-1.19.2-150300.16.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-client-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-client-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-devel-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-devel-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-mini-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-mini-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-mini-devel-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150300.16.1.s390x",
                "product": {
                  "name": "krb5-server-1.19.2-150300.16.1.s390x",
                  "product_id": "krb5-server-1.19.2-150300.16.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-32bit-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-client-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-client-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-devel-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-mini-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-mini-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-mini-devel-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-mini-devel-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.19.2-150300.16.1.x86_64",
                "product": {
                  "name": "krb5-server-1.19.2-150300.16.1.x86_64",
                  "product_id": "krb5-server-1.19.2-150300.16.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7.1",
                "product": {
                  "name": "SUSE Enterprise Storage 7.1",
                  "product_id": "SUSE Enterprise Storage 7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-client-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-devel-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.19.2-150300.16.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64"
        },
        "product_reference": "krb5-server-1.19.2-150300.16.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-27T00:48:41Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Enterprise Storage 7.1:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:krb5-server-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-32bit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-client-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-devel-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-kdb-ldap-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-otp-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-pkinit-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-plugin-preauth-spake-1.19.2-150300.16.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:krb5-server-1.19.2-150300.16.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-27T00:48:41Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26461"
    }
  ]
}
  suse-su-2024:1148-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for krb5",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-26458: Fixed a memory leak in pmap_rmt.c (bsc#1220770)\n- CVE-2024-26461: Fixed a memory leak in k5sealv3.c (bsc#1220771)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1148,SUSE-SLE-SDK-12-SP5-2024-1148,SUSE-SLE-SERVER-12-SP5-2024-1148",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1148-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1148-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241148-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1148-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220770",
        "url": "https://bugzilla.suse.com/1220770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220771",
        "url": "https://bugzilla.suse.com/1220771"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      }
    ],
    "title": "Security update for krb5",
    "tracking": {
      "current_release_date": "2024-04-08T09:35:32Z",
      "generator": {
        "date": "2024-04-08T09:35:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1148-1",
      "initial_release_date": "2024-04-08T09:35:32Z",
      "revision_history": [
        {
          "date": "2024-04-08T09:35:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-client-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-devel-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-doc-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-mini-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.aarch64",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.aarch64",
                  "product_id": "krb5-server-1.16.3-46.6.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-64bit-1.16.3-46.6.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-64bit-1.16.3-46.6.1.aarch64_ilp32",
                  "product_id": "krb5-64bit-1.16.3-46.6.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-64bit-1.16.3-46.6.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-devel-64bit-1.16.3-46.6.1.aarch64_ilp32",
                  "product_id": "krb5-devel-64bit-1.16.3-46.6.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.i586",
                  "product_id": "krb5-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.i586",
                  "product_id": "krb5-client-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.i586",
                  "product_id": "krb5-devel-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.i586",
                  "product_id": "krb5-doc-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.i586",
                  "product_id": "krb5-mini-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.i586",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.i586",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.i586",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.i586",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.i586",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.i586",
                  "product_id": "krb5-server-1.16.3-46.6.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-client-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-devel-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-doc-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-mini-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.ppc64le",
                  "product_id": "krb5-server-1.16.3-46.6.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.s390",
                  "product_id": "krb5-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.s390",
                  "product_id": "krb5-client-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.s390",
                  "product_id": "krb5-devel-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.s390",
                  "product_id": "krb5-doc-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.s390",
                  "product_id": "krb5-mini-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.s390",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.s390",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.s390",
                  "product_id": "krb5-server-1.16.3-46.6.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-32bit-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-32bit-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-client-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-devel-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-devel-32bit-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-devel-32bit-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-doc-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-mini-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.s390x",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.s390x",
                  "product_id": "krb5-server-1.16.3-46.6.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-32bit-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-client-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-client-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-devel-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-doc-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-doc-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-doc-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-mini-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-mini-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-mini-devel-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-46.6.1.x86_64",
                "product": {
                  "name": "krb5-server-1.16.3-46.6.1.x86_64",
                  "product_id": "krb5-server-1.16.3-46.6.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-devel-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-devel-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-devel-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-32bit-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-32bit-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-client-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-doc-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-doc-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-46.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64"
        },
        "product_reference": "krb5-server-1.16.3-46.6.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-08T09:35:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-32bit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-client-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-doc-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-kdb-ldap-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-otp-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-plugin-preauth-pkinit-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:krb5-server-1.16.3-46.6.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:krb5-devel-1.16.3-46.6.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-08T09:35:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26461"
    }
  ]
}
  suse-su-2024:0999-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for krb5",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for krb5 fixes the following issues:\n\n- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).\n- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-999,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-999,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-999,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-999",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0999-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:0999-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240999-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:0999-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220770",
        "url": "https://bugzilla.suse.com/1220770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220771",
        "url": "https://bugzilla.suse.com/1220771"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      }
    ],
    "title": "Security update for krb5",
    "tracking": {
      "current_release_date": "2024-03-26T13:03:47Z",
      "generator": {
        "date": "2024-03-26T13:03:47Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:0999-1",
      "initial_release_date": "2024-03-26T13:03:47Z",
      "revision_history": [
        {
          "date": "2024-03-26T13:03:47Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-client-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-client-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-devel-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-mini-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-mini-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-mini-devel-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-150100.3.33.1.aarch64",
                "product": {
                  "name": "krb5-server-1.16.3-150100.3.33.1.aarch64",
                  "product_id": "krb5-server-1.16.3-150100.3.33.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-64bit-1.16.3-150100.3.33.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-64bit-1.16.3-150100.3.33.1.aarch64_ilp32",
                  "product_id": "krb5-64bit-1.16.3-150100.3.33.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-64bit-1.16.3-150100.3.33.1.aarch64_ilp32",
                "product": {
                  "name": "krb5-devel-64bit-1.16.3-150100.3.33.1.aarch64_ilp32",
                  "product_id": "krb5-devel-64bit-1.16.3-150100.3.33.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-client-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-client-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-devel-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-devel-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-mini-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-mini-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-mini-devel-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-150100.3.33.1.i586",
                "product": {
                  "name": "krb5-server-1.16.3-150100.3.33.1.i586",
                  "product_id": "krb5-server-1.16.3-150100.3.33.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-client-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-devel-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-mini-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-mini-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-mini-devel-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-150100.3.33.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.16.3-150100.3.33.1.ppc64le",
                  "product_id": "krb5-server-1.16.3-150100.3.33.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-client-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-client-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-devel-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-devel-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-mini-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-mini-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-mini-devel-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-150100.3.33.1.s390x",
                "product": {
                  "name": "krb5-server-1.16.3-150100.3.33.1.s390x",
                  "product_id": "krb5-server-1.16.3-150100.3.33.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-32bit-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-client-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-client-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-devel-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-mini-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-mini-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-mini-devel-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-mini-devel-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-mini-devel-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.16.3-150100.3.33.1.x86_64",
                "product": {
                  "name": "krb5-server-1.16.3-150100.3.33.1.x86_64",
                  "product_id": "krb5-server-1.16.3-150100.3.33.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-client-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-devel-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.16.3-150100.3.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
        },
        "product_reference": "krb5-server-1.16.3-150100.3.33.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-26T13:03:47Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:krb5-server-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-32bit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-client-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-devel-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-kdb-ldap-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-otp-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-plugin-preauth-pkinit-1.16.3-150100.3.33.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:krb5-server-1.16.3-150100.3.33.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-03-26T13:03:47Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26461"
    }
  ]
}
  RHSA-2024:3268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3268",
        "url": "https://access.redhat.com/errata/RHSA-2024:3268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "RHEL-17131",
        "url": "https://issues.redhat.com/browse/RHEL-17131"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3268.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2025-10-08T14:14:08+00:00",
      "generator": {
        "date": "2025-10-08T14:14:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2024:3268",
      "initial_release_date": "2024-05-22T11:52:05+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-08T14:14:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.18.2-27.el8_10.src",
                "product": {
                  "name": "krb5-0:1.18.2-27.el8_10.src",
                  "product_id": "krb5-0:1.18.2-27.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.18.2-27.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.18.2-27.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src"
        },
        "product_reference": "krb5-0:1.18.2-27.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    }
  ]
}
  rhsa-2024_9331
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\n* krb5: Memory leak at /krb5/src/kdc/ndr.c (CVE-2024-26462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9331",
        "url": "https://access.redhat.com/errata/RHSA-2024:9331"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "2266742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9331.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:40:35+00:00",
      "generator": {
        "date": "2024-11-24T15:40:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:9331",
      "initial_release_date": "2024-11-12T09:08:27+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:40:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.21.1-3.el9.src",
                "product": {
                  "name": "krb5-0:1.21.1-3.el9.src",
                  "product_id": "krb5-0:1.21.1-3.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.21.1-3.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    },
    {
      "cve": "CVE-2024-26462",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/kdc/ndr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file ndr.c, a struct named b is defined, and its address is passed to the function k5_buf_init_dynamic. Inside this function, b is referred to as buf, and the malloc function is used to allocate dynamic memory for buf-\u003edata. After k5_buf_init_dynamic completes and returns, if an if statement evaluates to true, the program returns. During this process, the memory allocated to b is not freed, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/kdc/ndr.c"
    }
  ]
}
  RHSA-2024:9331
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\n* krb5: Memory leak at /krb5/src/kdc/ndr.c (CVE-2024-26462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9331",
        "url": "https://access.redhat.com/errata/RHSA-2024:9331"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "2266742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9331.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2025-10-08T14:15:25+00:00",
      "generator": {
        "date": "2025-10-08T14:15:25+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2024:9331",
      "initial_release_date": "2024-11-12T09:08:27+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-08T14:15:25+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.21.1-3.el9.src",
                "product": {
                  "name": "krb5-0:1.21.1-3.el9.src",
                  "product_id": "krb5-0:1.21.1-3.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.21.1-3.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    },
    {
      "cve": "CVE-2024-26462",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/kdc/ndr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file ndr.c, a struct named b is defined, and its address is passed to the function k5_buf_init_dynamic. Inside this function, b is referred to as buf, and the malloc function is used to allocate dynamic memory for buf-\u003edata. After k5_buf_init_dynamic completes and returns, if an if statement evaluates to true, the program returns. During this process, the memory allocated to b is not freed, leading to a memory leak defect.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-401: Missing Release of Memory after Effective Lifetime vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive configurations necessary for operational requirements. Baseline and configuration setting controls ensure secure system and software configurations, while least functionality reduces the attack surface and minimizes the risk of resource exhaustion from memory leaks. The environment employs malicious code protections such as IDS/IPS and antimalware solutions to detect threats and provide real-time visibility into memory usage, helping prevent memory management issues before they lead to system crashes or exhaustion. Event logs are collected and analyzed for correlation, monitoring, alerting, and retention, supporting the detection of abnormal memory usage patterns that may indicate potential leaks. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the risk of input-based denial-of-service (DoS) attacks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are implemented to strengthen defenses against memory allocation vulnerabilities.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/kdc/ndr.c"
    }
  ]
}
  rhsa-2024:9331
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\n* krb5: Memory leak at /krb5/src/kdc/ndr.c (CVE-2024-26462)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9331",
        "url": "https://access.redhat.com/errata/RHSA-2024:9331"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "2266742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9331.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2025-10-08T14:15:25+00:00",
      "generator": {
        "date": "2025-10-08T14:15:25+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2024:9331",
      "initial_release_date": "2024-11-12T09:08:27+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:08:27+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-08T14:15:25+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 9)",
                  "product_id": "BaseOS-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.21.1-3.el9.src",
                "product": {
                  "name": "krb5-0:1.21.1-3.el9.src",
                  "product_id": "krb5-0:1.21.1-3.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.21.1-3.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.i686",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debugsource-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.21.1-3.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                "product": {
                  "name": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_id": "krb5-devel-0:1.21.1-3.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.21.1-3.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.21.1-3.el9.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src"
        },
        "product_reference": "krb5-0:1.21.1-3.el9.src",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-devel-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.i686",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
          "product_id": "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
        "relates_to_product_reference": "BaseOS-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    },
    {
      "cve": "CVE-2024-26462",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/kdc/ndr.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file ndr.c, a struct named b is defined, and its address is passed to the function k5_buf_init_dynamic. Inside this function, b is referred to as buf, and the malloc function is used to allocate dynamic memory for buf-\u003edata. After k5_buf_init_dynamic completes and returns, if an if statement evaluates to true, the program returns. During this process, the memory allocated to b is not freed, leading to a memory leak defect.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-401: Missing Release of Memory after Effective Lifetime vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive configurations necessary for operational requirements. Baseline and configuration setting controls ensure secure system and software configurations, while least functionality reduces the attack surface and minimizes the risk of resource exhaustion from memory leaks. The environment employs malicious code protections such as IDS/IPS and antimalware solutions to detect threats and provide real-time visibility into memory usage, helping prevent memory management issues before they lead to system crashes or exhaustion. Event logs are collected and analyzed for correlation, monitoring, alerting, and retention, supporting the detection of abnormal memory usage patterns that may indicate potential leaks. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the risk of input-based denial-of-service (DoS) attacks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are implemented to strengthen defenses against memory allocation vulnerabilities.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
          "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26462",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26462"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:08:27+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9331"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "AppStream-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-0:1.21.1-3.el9.src",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-debugsource-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-devel-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-libs-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-pkinit-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-server-ldap-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:krb5-workstation-debuginfo-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-0:1.21.1-3.el9.x86_64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.aarch64",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.i686",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.ppc64le",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.s390x",
            "BaseOS-9.5.0.GA:libkadm5-debuginfo-0:1.21.1-3.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/kdc/ndr.c"
    }
  ]
}
  rhsa-2024_3268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3268",
        "url": "https://access.redhat.com/errata/RHSA-2024:3268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "RHEL-17131",
        "url": "https://issues.redhat.com/browse/RHEL-17131"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3268.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2024-11-24T15:20:07+00:00",
      "generator": {
        "date": "2024-11-24T15:20:07+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3268",
      "initial_release_date": "2024-05-22T11:52:05+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T15:20:07+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.18.2-27.el8_10.src",
                "product": {
                  "name": "krb5-0:1.18.2-27.el8_10.src",
                  "product_id": "krb5-0:1.18.2-27.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.18.2-27.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.18.2-27.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src"
        },
        "product_reference": "krb5-0:1.18.2-27.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    }
  ]
}
  rhsa-2024:3268
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for krb5 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).\n\nSecurity Fix(es):\n\n* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)\n\n* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3268",
        "url": "https://access.redhat.com/errata/RHSA-2024:3268"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "2266731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
      },
      {
        "category": "external",
        "summary": "2266740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
      },
      {
        "category": "external",
        "summary": "RHEL-17131",
        "url": "https://issues.redhat.com/browse/RHEL-17131"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3268.json"
      }
    ],
    "title": "Red Hat Security Advisory: krb5 security update",
    "tracking": {
      "current_release_date": "2025-10-08T14:14:08+00:00",
      "generator": {
        "date": "2025-10-08T14:14:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2024:3268",
      "initial_release_date": "2024-05-22T11:52:05+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:52:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-08T14:14:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS (v. 8)",
                  "product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-0:1.18.2-27.el8_10.src",
                "product": {
                  "name": "krb5-0:1.18.2-27.el8_10.src",
                  "product_id": "krb5-0:1.18.2-27.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5@1.18.2-27.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debugsource@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-devel-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-libs-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-pkinit-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-server-ldap-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/krb5-workstation-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                "product": {
                  "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_id": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/libkadm5-debuginfo@1.18.2-27.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-0:1.18.2-27.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src"
        },
        "product_reference": "krb5-0:1.18.2-27.el8_10.src",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
          "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        },
        "product_reference": "libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64",
        "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266731"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/rpc/pmap_rmt.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In pmap_rmt.c, a variable named port_ptr is defined and its address is passed to gssrpc_xdr_reference, where it is called pp. The program uses the macro mem_alloc (which refers to malloc) to allocate dynamic memory for pp. After allocation, if the xdr_u_int32(xdrs, \u0026crp-\u003eresultslen) call within the if condition returns false, the overall if statement evaluates to false. The program then returns without using or freeing the memory allocated to port_ptr, resulting in a memory leak.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266731",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266731"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26458",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26458"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2024-02-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2266740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In the file k5sealv3.c, a variable named plain is defined and its address is passed to alloc_data. Inside alloc_data, plain is called data, and calloc allocates memory for ptr, which is assigned to data-\u003edata. If an if condition evaluates to true, the program jumps to an error label using a goto statement, leaving the memory allocated to plain unused and unreleased, leading to a memory leak defect.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
          "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "RHBZ#2266740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-26461",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26461"
        }
      ],
      "release_date": "2024-02-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:52:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, running Kerberos services (krb5kdc, kadmin, and kprop) will be restarted automatically.",
          "product_ids": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3268"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-0:1.18.2-27.el8_10.src",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-debugsource-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-devel-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-libs-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-pkinit-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-server-ldap-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:krb5-workstation-debuginfo-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-0:1.18.2-27.el8_10.x86_64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.aarch64",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.i686",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.ppc64le",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.s390x",
            "BaseOS-8.10.0.Z.MAIN.EUS:libkadm5-debuginfo-0:1.18.2-27.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c"
    }
  ]
}
  wid-sec-w-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  wid-sec-w-2025-0225
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand herbeizuf\u00fchren und einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2025-0225 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0225.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2025-0225 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0225"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2025-022 vom 2025-01-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000279157/dsa-2025-022-security-update-for-dell-powerprotect-dd-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2025-2804 vom 2025-04-02",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2804.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
        "url": "https://ubuntu.com/security/notices/USN-7429-2"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
        "url": "https://ubuntu.com/security/notices/USN-7429-1"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:04.568+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2025-0225",
      "initial_release_date": "2025-01-30T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2025-01-30T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-04-01T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2025-04-09T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.3.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.3.0.0",
                  "product_id": "T040718"
                }
              },
              {
                "category": "product_version",
                "name": "8.3.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.3.0.0",
                  "product_id": "T040718-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.20",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.20",
                  "product_id": "T040719"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.20",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.20",
                  "product_id": "T040719-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.20"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.50",
                  "product_id": "T040721"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.50",
                  "product_id": "T040721-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-4235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2013-4235"
    },
    {
      "cve": "CVE-2015-8100",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2015-8100"
    },
    {
      "cve": "CVE-2017-9271",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2017-9271"
    },
    {
      "cve": "CVE-2018-6798",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2018-6798"
    },
    {
      "cve": "CVE-2018-6913",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2018-6913"
    },
    {
      "cve": "CVE-2019-20633",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2019-20633"
    },
    {
      "cve": "CVE-2019-20892",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2019-20892"
    },
    {
      "cve": "CVE-2020-12762",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-12762"
    },
    {
      "cve": "CVE-2020-15861",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-15861"
    },
    {
      "cve": "CVE-2020-15862",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2020-15862"
    },
    {
      "cve": "CVE-2021-3521",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-3521"
    },
    {
      "cve": "CVE-2021-37750",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-37750"
    },
    {
      "cve": "CVE-2021-46933",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-46933"
    },
    {
      "cve": "CVE-2021-46955",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-46955"
    },
    {
      "cve": "CVE-2021-47074",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47074"
    },
    {
      "cve": "CVE-2021-47113",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47113"
    },
    {
      "cve": "CVE-2021-47131",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47131"
    },
    {
      "cve": "CVE-2021-47162",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47162"
    },
    {
      "cve": "CVE-2021-47171",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47171"
    },
    {
      "cve": "CVE-2021-47188",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47188"
    },
    {
      "cve": "CVE-2021-47206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47206"
    },
    {
      "cve": "CVE-2021-47220",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47220"
    },
    {
      "cve": "CVE-2021-47229",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47229"
    },
    {
      "cve": "CVE-2021-47231",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47231"
    },
    {
      "cve": "CVE-2021-47235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2021-47235"
    },
    {
      "cve": "CVE-2022-2601",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-3775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-3775"
    },
    {
      "cve": "CVE-2022-44792",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-44792"
    },
    {
      "cve": "CVE-2022-44793",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-44793"
    },
    {
      "cve": "CVE-2022-48566",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2022-48566"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-28074",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-28074"
    },
    {
      "cve": "CVE-2023-3164",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-3164"
    },
    {
      "cve": "CVE-2023-36632",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-36632"
    },
    {
      "cve": "CVE-2023-4421",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-4421"
    },
    {
      "cve": "CVE-2023-44487",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45288",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-45733",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45733"
    },
    {
      "cve": "CVE-2023-45745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45745"
    },
    {
      "cve": "CVE-2023-45918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-45918"
    },
    {
      "cve": "CVE-2023-46103",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-46103"
    },
    {
      "cve": "CVE-2023-4692",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-4692"
    },
    {
      "cve": "CVE-2023-47233",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-47233"
    },
    {
      "cve": "CVE-2023-47855",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-47855"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-52428",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52428"
    },
    {
      "cve": "CVE-2023-52527",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52527"
    },
    {
      "cve": "CVE-2023-52586",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52586"
    },
    {
      "cve": "CVE-2023-52591",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52591"
    },
    {
      "cve": "CVE-2023-52646",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52646"
    },
    {
      "cve": "CVE-2023-52653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52653"
    },
    {
      "cve": "CVE-2023-52655",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52655"
    },
    {
      "cve": "CVE-2023-52664",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52664"
    },
    {
      "cve": "CVE-2023-52685",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52685"
    },
    {
      "cve": "CVE-2023-52686",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52686"
    },
    {
      "cve": "CVE-2023-52691",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52691"
    },
    {
      "cve": "CVE-2023-52696",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52696"
    },
    {
      "cve": "CVE-2023-52698",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52698"
    },
    {
      "cve": "CVE-2023-52703",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52703"
    },
    {
      "cve": "CVE-2023-52730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52730"
    },
    {
      "cve": "CVE-2023-52732",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52732"
    },
    {
      "cve": "CVE-2023-52741",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52741"
    },
    {
      "cve": "CVE-2023-52742",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52742"
    },
    {
      "cve": "CVE-2023-52747",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52747"
    },
    {
      "cve": "CVE-2023-52759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52759"
    },
    {
      "cve": "CVE-2023-52774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52774"
    },
    {
      "cve": "CVE-2023-52781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52781"
    },
    {
      "cve": "CVE-2023-52796",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52796"
    },
    {
      "cve": "CVE-2023-52803",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52803"
    },
    {
      "cve": "CVE-2023-52821",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52821"
    },
    {
      "cve": "CVE-2023-52864",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52864"
    },
    {
      "cve": "CVE-2023-52865",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52865"
    },
    {
      "cve": "CVE-2023-52867",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52867"
    },
    {
      "cve": "CVE-2023-52875",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52875"
    },
    {
      "cve": "CVE-2023-52880",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-52880"
    },
    {
      "cve": "CVE-2023-5388",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5388"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-5992",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-5992"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2024-0397",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0397"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0639",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0639"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-1737",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-1737"
    },
    {
      "cve": "CVE-2024-1975",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-1975"
    },
    {
      "cve": "CVE-2024-2004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-20696",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-20696"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-2398",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-24577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-24577"
    },
    {
      "cve": "CVE-2024-24790",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-24790"
    },
    {
      "cve": "CVE-2024-2511",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-25710",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-25710"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26625",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26625"
    },
    {
      "cve": "CVE-2024-26739",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26739"
    },
    {
      "cve": "CVE-2024-26752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26752"
    },
    {
      "cve": "CVE-2024-26775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26775"
    },
    {
      "cve": "CVE-2024-26791",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26791"
    },
    {
      "cve": "CVE-2024-26828",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26828"
    },
    {
      "cve": "CVE-2024-26846",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26846"
    },
    {
      "cve": "CVE-2024-26874",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26874"
    },
    {
      "cve": "CVE-2024-26876",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26876"
    },
    {
      "cve": "CVE-2024-26900",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-26915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26915"
    },
    {
      "cve": "CVE-2024-26920",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26920"
    },
    {
      "cve": "CVE-2024-26921",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26921"
    },
    {
      "cve": "CVE-2024-26929",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26929"
    },
    {
      "cve": "CVE-2024-26930",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26930"
    },
    {
      "cve": "CVE-2024-26931",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26931"
    },
    {
      "cve": "CVE-2024-26934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26934"
    },
    {
      "cve": "CVE-2024-26957",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26958",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26958"
    },
    {
      "cve": "CVE-2024-26984",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26984"
    },
    {
      "cve": "CVE-2024-26996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-26996"
    },
    {
      "cve": "CVE-2024-27008",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27008"
    },
    {
      "cve": "CVE-2024-27054",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27054"
    },
    {
      "cve": "CVE-2024-27059",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27059"
    },
    {
      "cve": "CVE-2024-27062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27062"
    },
    {
      "cve": "CVE-2024-27388",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27388"
    },
    {
      "cve": "CVE-2024-27396",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27396"
    },
    {
      "cve": "CVE-2024-27398",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27398"
    },
    {
      "cve": "CVE-2024-27401",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27401"
    },
    {
      "cve": "CVE-2024-27419",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27419"
    },
    {
      "cve": "CVE-2024-27436",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-27436"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-2961",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-32487",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-32487"
    },
    {
      "cve": "CVE-2024-33599",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-33871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-33871"
    },
    {
      "cve": "CVE-2024-34062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34062"
    },
    {
      "cve": "CVE-2024-34064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-34459",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-34459"
    },
    {
      "cve": "CVE-2024-35195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-35235",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35235"
    },
    {
      "cve": "CVE-2024-35789",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35789"
    },
    {
      "cve": "CVE-2024-35791",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35791"
    },
    {
      "cve": "CVE-2024-35809",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35811",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35811"
    },
    {
      "cve": "CVE-2024-35830",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35849"
    },
    {
      "cve": "CVE-2024-35877",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35877"
    },
    {
      "cve": "CVE-2024-35878",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35878"
    },
    {
      "cve": "CVE-2024-35887",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35887"
    },
    {
      "cve": "CVE-2024-35895",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35895"
    },
    {
      "cve": "CVE-2024-35914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35914"
    },
    {
      "cve": "CVE-2024-35932",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35932"
    },
    {
      "cve": "CVE-2024-35935",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35935"
    },
    {
      "cve": "CVE-2024-35936",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35936"
    },
    {
      "cve": "CVE-2024-35944",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-35955",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35955"
    },
    {
      "cve": "CVE-2024-35969",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35969"
    },
    {
      "cve": "CVE-2024-35982",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-35982"
    },
    {
      "cve": "CVE-2024-36015",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36015"
    },
    {
      "cve": "CVE-2024-36029",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36029"
    },
    {
      "cve": "CVE-2024-3651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-3651"
    },
    {
      "cve": "CVE-2024-36954",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-36954"
    },
    {
      "cve": "CVE-2024-37370",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38428",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-38428"
    },
    {
      "cve": "CVE-2024-39689",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-39689"
    },
    {
      "cve": "CVE-2024-4032",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4032"
    },
    {
      "cve": "CVE-2024-41110",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-41110"
    },
    {
      "cve": "CVE-2024-4317",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4317"
    },
    {
      "cve": "CVE-2024-4741",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-4741"
    },
    {
      "cve": "CVE-2024-5206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-5206"
    },
    {
      "cve": "CVE-2024-5535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-6232",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6232"
    },
    {
      "cve": "CVE-2024-6345",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6345"
    },
    {
      "cve": "CVE-2024-6655",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-6655"
    },
    {
      "cve": "CVE-2024-7264",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-7592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-7592"
    },
    {
      "cve": "CVE-2024-53295",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-53295"
    },
    {
      "cve": "CVE-2024-51534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-51534"
    },
    {
      "cve": "CVE-2024-53296",
      "product_status": {
        "known_affected": [
          "T045853",
          "T040719",
          "T045852",
          "T040718",
          "T045854",
          "T000126",
          "T040721",
          "398363"
        ]
      },
      "release_date": "2025-01-30T23:00:00.000+00:00",
      "title": "CVE-2024-53296"
    }
  ]
}
  wid-sec-w-2024-1307
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Service Mesh Containers ausnutzen, um Dateien zu manipulieren, einen \u0027Denial of Service\u0027-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1307 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1307.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1307 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1307"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3680 vom 2024-06-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:3680"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3683 vom 2024-06-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:3683"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:3790"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13",
        "url": "https://access.redhat.com/errata/RHSA-2024:3314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1616 vom 2024-07-01",
        "url": "https://access.redhat.com/errata/RHSA-2024:1616"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4553 vom 2024-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:4553"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
        "url": "https://access.redhat.com/errata/RHSA-2024:7184"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:8688 vom 2024-11-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:8688"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:8692 vom 2024-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:8692"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9088 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9088"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift Service Mesh Containers: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T11:13:17.378+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1307",
      "initial_release_date": "2024-06-06T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-06-06T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-06-10T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-18T22:00:00.000+00:00",
          "number": "4",
          "summary": "Korrektur Plattformauswahl"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-10-03T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-06T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "9"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9",
                "product": {
                  "name": "Red Hat Enterprise Linux 9",
                  "product_id": "T038901",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Service Mesh Containers \u003c2.5.2",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers \u003c2.5.2",
                  "product_id": "T035259"
                }
              },
              {
                "category": "product_version",
                "name": "Service Mesh Containers 2.5.2",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers 2.5.2",
                  "product_id": "T035259-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:service_mesh_containers__2.5.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Service Mesh Containers \u003c2.4.8",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers \u003c2.4.8",
                  "product_id": "T035260"
                }
              },
              {
                "category": "product_version",
                "name": "Service Mesh Containers 2.4.8",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers 2.4.8",
                  "product_id": "T035260-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:service_mesh_containers__2.4.8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Run Once Duration Override Operator 1",
                "product": {
                  "name": "Red Hat OpenShift Run Once Duration Override Operator 1",
                  "product_id": "T035698",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:run_once_duration_override_operator_1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.38",
                  "product_id": "T037940"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.38",
                  "product_id": "T037940-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-25220",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-25220"
    },
    {
      "cve": "CVE-2021-43618",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-43618"
    },
    {
      "cve": "CVE-2021-46848",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-1271",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-2795",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-3094",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-36227",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-47024",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48468",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48468"
    },
    {
      "cve": "CVE-2022-48554",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48554"
    },
    {
      "cve": "CVE-2022-48624",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2602",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2602"
    },
    {
      "cve": "CVE-2023-2603",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2603"
    },
    {
      "cve": "CVE-2023-29491",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-29491"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-36054",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-36054"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-39975",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-39975"
    },
    {
      "cve": "CVE-2023-4408",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-44487",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45288",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-4641",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4641"
    },
    {
      "cve": "CVE-2023-4692",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4692"
    },
    {
      "cve": "CVE-2023-4693",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4693"
    },
    {
      "cve": "CVE-2023-47038",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-47038"
    },
    {
      "cve": "CVE-2023-50387",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-50387"
    },
    {
      "cve": "CVE-2023-50868",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2023-5517",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5517"
    },
    {
      "cve": "CVE-2023-5678",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5679",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5679"
    },
    {
      "cve": "CVE-2023-6004",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6129",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6129"
    },
    {
      "cve": "CVE-2023-6237",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6237"
    },
    {
      "cve": "CVE-2023-6516",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6516"
    },
    {
      "cve": "CVE-2023-6597",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7008",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-7008"
    },
    {
      "cve": "CVE-2023-7104",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-7104"
    },
    {
      "cve": "CVE-2024-0450",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-1048",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1048"
    },
    {
      "cve": "CVE-2024-1313",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1313"
    },
    {
      "cve": "CVE-2024-1394",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1394"
    },
    {
      "cve": "CVE-2024-22195",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-24786",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-24786"
    },
    {
      "cve": "CVE-2024-25062",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26458",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28834",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-28835",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-28835"
    },
    {
      "cve": "CVE-2024-2961",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-33599",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33602"
    }
  ]
}
  WID-SEC-W-2024-1307
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Service Mesh Containers ausnutzen, um Dateien zu manipulieren, einen \u0027Denial of Service\u0027-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-1307 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1307.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-1307 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1307"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3680 vom 2024-06-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:3680"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3683 vom 2024-06-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:3683"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:3790"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13",
        "url": "https://access.redhat.com/errata/RHSA-2024:3314"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1616 vom 2024-07-01",
        "url": "https://access.redhat.com/errata/RHSA-2024:1616"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:4553 vom 2024-07-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:4553"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
        "url": "https://access.redhat.com/errata/RHSA-2024:7184"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:8688 vom 2024-11-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:8688"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:8692 vom 2024-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:8692"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9088 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9088"
      }
    ],
    "source_lang": "en-US",
    "title": "Red Hat OpenShift Service Mesh Containers: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-11-11T23:00:00.000+00:00",
      "generator": {
        "date": "2024-11-12T11:13:17.378+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-1307",
      "initial_release_date": "2024-06-06T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-06-06T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-06-10T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-18T22:00:00.000+00:00",
          "number": "4",
          "summary": "Korrektur Plattformauswahl"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-07-15T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-10-03T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-06T23:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "9"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9",
                "product": {
                  "name": "Red Hat Enterprise Linux 9",
                  "product_id": "T038901",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "Service Mesh Containers \u003c2.5.2",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers \u003c2.5.2",
                  "product_id": "T035259"
                }
              },
              {
                "category": "product_version",
                "name": "Service Mesh Containers 2.5.2",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers 2.5.2",
                  "product_id": "T035259-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:service_mesh_containers__2.5.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Service Mesh Containers \u003c2.4.8",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers \u003c2.4.8",
                  "product_id": "T035260"
                }
              },
              {
                "category": "product_version",
                "name": "Service Mesh Containers 2.4.8",
                "product": {
                  "name": "Red Hat OpenShift Service Mesh Containers 2.4.8",
                  "product_id": "T035260-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:service_mesh_containers__2.4.8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Run Once Duration Override Operator 1",
                "product": {
                  "name": "Red Hat OpenShift Run Once Duration Override Operator 1",
                  "product_id": "T035698",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:run_once_duration_override_operator_1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.38",
                  "product_id": "T037940"
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.14.38",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.14.38",
                  "product_id": "T037940-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-25220",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-25220"
    },
    {
      "cve": "CVE-2021-43618",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-43618"
    },
    {
      "cve": "CVE-2021-46848",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-1271",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-2795",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-2795"
    },
    {
      "cve": "CVE-2022-3094",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-3094"
    },
    {
      "cve": "CVE-2022-36227",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-36227"
    },
    {
      "cve": "CVE-2022-47024",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-47024"
    },
    {
      "cve": "CVE-2022-47629",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-47629"
    },
    {
      "cve": "CVE-2022-48303",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48468",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48468"
    },
    {
      "cve": "CVE-2022-48554",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48554"
    },
    {
      "cve": "CVE-2022-48624",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-22745",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2602",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2602"
    },
    {
      "cve": "CVE-2023-2603",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2603"
    },
    {
      "cve": "CVE-2023-29491",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-29491"
    },
    {
      "cve": "CVE-2023-2975",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-2975"
    },
    {
      "cve": "CVE-2023-3446",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-36054",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-36054"
    },
    {
      "cve": "CVE-2023-3817",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-39975",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-39975"
    },
    {
      "cve": "CVE-2023-4408",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4408"
    },
    {
      "cve": "CVE-2023-44487",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45288",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-4641",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4641"
    },
    {
      "cve": "CVE-2023-4692",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4692"
    },
    {
      "cve": "CVE-2023-4693",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-4693"
    },
    {
      "cve": "CVE-2023-47038",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-47038"
    },
    {
      "cve": "CVE-2023-50387",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-50387"
    },
    {
      "cve": "CVE-2023-50868",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-50868"
    },
    {
      "cve": "CVE-2023-5517",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5517"
    },
    {
      "cve": "CVE-2023-5678",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5679",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-5679"
    },
    {
      "cve": "CVE-2023-6004",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6129",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6129"
    },
    {
      "cve": "CVE-2023-6237",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6237"
    },
    {
      "cve": "CVE-2023-6516",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6516"
    },
    {
      "cve": "CVE-2023-6597",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7008",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-7008"
    },
    {
      "cve": "CVE-2023-7104",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2023-7104"
    },
    {
      "cve": "CVE-2024-0450",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-1048",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1048"
    },
    {
      "cve": "CVE-2024-1313",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1313"
    },
    {
      "cve": "CVE-2024-1394",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-1394"
    },
    {
      "cve": "CVE-2024-22195",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-24786",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-24786"
    },
    {
      "cve": "CVE-2024-25062",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26458",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28834",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-28835",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-28835"
    },
    {
      "cve": "CVE-2024-2961",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-33599",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "notes": [
        {
          "category": "description",
          "text": "In Red Hat OpenShift existieren mehrere Schwachstellen. Diese Fehler bestehen in verschiedenen Komponenten und Subsystemen wie der Libksba-Library, BIND, gmp und der Tar-Paketkomponente aufgrund einer Race Condition, einer NULL-Zeiger-Dereferenz, einem Speicherzuordnungsproblem und mehr. Ein Angreifer kann diese Schwachstellen ausnutzen, um Dateien zu manipulieren, einen Denial of Service-Zustand erzuegen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen oder weitere nicht spezifizierte Angriffe durchzuf\u00fchren."
        }
      ],
      "product_status": {
        "known_affected": [
          "T035259",
          "T038901",
          "67646",
          "T035260",
          "T037940",
          "T035698"
        ]
      },
      "release_date": "2024-06-06T22:00:00.000+00:00",
      "title": "CVE-2024-33602"
    }
  ]
}
  wid-sec-w-2024-0485
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Kerberos ist ein verteilter Netzwerkdienst zur Authentifizierung. MIT Kerberos ist die freie Implementierung des \"Kerberos network authentication protocol\", des Massachusetts Institute of Technology (MIT).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in MIT Kerberos ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0485 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0485.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0485 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0485"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018218.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018220.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0999-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018219.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1001-1 vom 2024-03-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1006-1 vom 2024-03-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1148-1 vom 2024-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018275.html"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20240415-0010 vom 2024-04-15",
        "url": "https://security.netapp.com/advisory/ntap-20240415-0010/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3268 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3268"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3268 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3268.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2512 vom 2024-06-28",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2512.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-BDC305FE55 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-bdc305fe55"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-1F68985052 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1f68985052"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-DF2C70DBA9 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-df2c70dba9"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7160134 vom 2024-07-12",
        "url": "https://www.ibm.com/support/pages/node/7160134"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
        "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-412 vom 2024-09-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000230678/dsa-2024-412-security-update-for-dell-ecs-3-8-1-2-multiple-third-party-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
        "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin",
        "url": "https://www.ibm.com/support/pages/node/7174634"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9331 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9331"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
        "url": "https://www.ibm.com/support/pages/node/7178065"
      }
    ],
    "source_lang": "en-US",
    "title": "MIT Kerberos: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2024-12-08T23:00:00.000+00:00",
      "generator": {
        "date": "2024-12-09T09:21:17.027+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2024-0485",
      "initial_release_date": "2024-02-26T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-02-26T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-03-26T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-03-27T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-08T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-15T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-07-09T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-07-11T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-08-05T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-09-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-10-09T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-10-31T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-12-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "16"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.8.1.2",
                "product": {
                  "name": "Dell ECS \u003c3.8.1.2",
                  "product_id": "T037906"
                }
              },
              {
                "category": "product_version",
                "name": "3.8.1.2",
                "product": {
                  "name": "Dell ECS 3.8.1.2",
                  "product_id": "T037906-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:ecs:3.8.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ECS"
          },
          {
            "category": "product_name",
            "name": "Dell NetWorker",
            "product": {
              "name": "Dell NetWorker",
              "product_id": "T024663",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:networker:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "EMC Avamar",
            "product": {
              "name": "EMC Avamar",
              "product_id": "T014381",
              "product_identification_helper": {
                "cpe": "cpe:/a:emc:avamar:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM MQ",
            "product": {
              "name": "IBM MQ",
              "product_id": "T036688",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:mq:operator"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9",
                  "product_id": "T036127"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9",
                  "product_id": "T036127-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP10 IF01",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
                  "product_id": "T038741"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP10 IF01",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
                  "product_id": "T038741-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2",
                "product": {
                  "name": "MIT Kerberos krb5-1.21.2",
                  "product_id": "T033104",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:mit:kerberos:krb5-1.21.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Kerberos"
          }
        ],
        "category": "vendor",
        "name": "MIT"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp ActiveIQ Unified Manager",
            "product": {
              "name": "NetApp ActiveIQ Unified Manager",
              "product_id": "T026333",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:active_iq_unified_manager:vmware_vsphere"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26462",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26462"
    }
  ]
}
  WID-SEC-W-2024-3377
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Dell PowerProtect Data Domain Appliances sind speziell f\u00fcr Backup und Daten-Deduplizierung ausgelegte Systeme.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Dell PowerProtect Data Domain ausnutzen, um seine Privilegien zu erh\u00f6hen, Informationen offenzulegen und um nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3377 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3377.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3377 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3377"
      },
      {
        "category": "external",
        "summary": "Dell Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000245360/dsa-2024-424-security-update-for-dell-pdsa-2024-424-security-update-for-dell-powerprotect-dd-vulnerabilityowerprotect-dd-vulnerability"
      },
      {
        "category": "external",
        "summary": "Security Update for Dell PowerProtect Data Domain",
        "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities"
      }
    ],
    "source_lang": "en-US",
    "title": "Dell PowerProtect Data Domain: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:21:01.974+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-3377",
      "initial_release_date": "2024-11-07T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-11-07T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Dell aufgenommen"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c8.1.0.0",
                  "product_id": "T038861"
                }
              },
              {
                "category": "product_version",
                "name": "8.1.0.0",
                "product": {
                  "name": "Dell PowerProtect Data Domain 8.1.0.0",
                  "product_id": "T038861-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:8.1.0.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.13.1.10",
                  "product_id": "T038862"
                }
              },
              {
                "category": "product_version",
                "name": "7.13.1.10",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.13.1.10",
                  "product_id": "T038862-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.10.1.40",
                  "product_id": "T038863"
                }
              },
              {
                "category": "product_version",
                "name": "7.10.1.40",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.10.1.40",
                  "product_id": "T038863-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.40"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain \u003c7.7.5.50",
                  "product_id": "T038864"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.5.50",
                "product": {
                  "name": "Dell PowerProtect Data Domain 7.7.5.50",
                  "product_id": "T038864-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:7.7.5.50"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Dell PowerProtect Data Domain",
                "product": {
                  "name": "Dell PowerProtect Data Domain",
                  "product_id": "T045852",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:powerprotect_data_domain:-"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PowerProtect Data Domain"
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain Management Center",
            "product": {
              "name": "Dell PowerProtect Data Domain Management Center",
              "product_id": "T045853",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Dell PowerProtect Data Domain OS",
            "product": {
              "name": "Dell PowerProtect Data Domain OS",
              "product_id": "T045854",
              "product_identification_helper": {
                "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-45759",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-45759"
    },
    {
      "cve": "CVE-2024-48010",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48010"
    },
    {
      "cve": "CVE-2024-48011",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-48011"
    },
    {
      "cve": "CVE-2017-16829",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-16829"
    },
    {
      "cve": "CVE-2017-5849",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2017-5849"
    },
    {
      "cve": "CVE-2018-7208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2018-7208"
    },
    {
      "cve": "CVE-2019-14889",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2019-14889"
    },
    {
      "cve": "CVE-2020-12912",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-12912"
    },
    {
      "cve": "CVE-2020-16135",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-16135"
    },
    {
      "cve": "CVE-2020-1730",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-1730"
    },
    {
      "cve": "CVE-2020-24455",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-24455"
    },
    {
      "cve": "CVE-2020-8694",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8694"
    },
    {
      "cve": "CVE-2020-8695",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2020-8695"
    },
    {
      "cve": "CVE-2021-27219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-3565",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3565"
    },
    {
      "cve": "CVE-2021-3634",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2021-3634"
    },
    {
      "cve": "CVE-2022-1210",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1210"
    },
    {
      "cve": "CVE-2022-1622",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1622"
    },
    {
      "cve": "CVE-2022-1996",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-1996"
    },
    {
      "cve": "CVE-2022-22576",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-25313",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-27774",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27781",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-29361",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-29361"
    },
    {
      "cve": "CVE-2022-32205",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-40023",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40023"
    },
    {
      "cve": "CVE-2022-40090",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-40090"
    },
    {
      "cve": "CVE-2022-42915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-4603",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-4603"
    },
    {
      "cve": "CVE-2022-48064",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48064"
    },
    {
      "cve": "CVE-2022-48624",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2022-48624"
    },
    {
      "cve": "CVE-2023-0461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-0461"
    },
    {
      "cve": "CVE-2023-1667",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1667"
    },
    {
      "cve": "CVE-2023-1916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-1916"
    },
    {
      "cve": "CVE-2023-20592",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-20592"
    },
    {
      "cve": "CVE-2023-2137",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2137"
    },
    {
      "cve": "CVE-2023-22745",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-22745"
    },
    {
      "cve": "CVE-2023-2283",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2283"
    },
    {
      "cve": "CVE-2023-23914",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-23934",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-23934"
    },
    {
      "cve": "CVE-2023-25577",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-25577"
    },
    {
      "cve": "CVE-2023-26965",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-26965"
    },
    {
      "cve": "CVE-2023-27043",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-2731",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-2731"
    },
    {
      "cve": "CVE-2023-27533",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27538",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28319",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28319"
    },
    {
      "cve": "CVE-2023-28320",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28320"
    },
    {
      "cve": "CVE-2023-28321",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28321"
    },
    {
      "cve": "CVE-2023-28322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-28322"
    },
    {
      "cve": "CVE-2023-31083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-31083"
    },
    {
      "cve": "CVE-2023-34055",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-34055"
    },
    {
      "cve": "CVE-2023-35116",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-35116"
    },
    {
      "cve": "CVE-2023-38286",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38286"
    },
    {
      "cve": "CVE-2023-38469",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38469"
    },
    {
      "cve": "CVE-2023-38471",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38471"
    },
    {
      "cve": "CVE-2023-38472",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38472"
    },
    {
      "cve": "CVE-2023-38545",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38545"
    },
    {
      "cve": "CVE-2023-38546",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-38546"
    },
    {
      "cve": "CVE-2023-39197",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39197"
    },
    {
      "cve": "CVE-2023-39198",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39198"
    },
    {
      "cve": "CVE-2023-39804",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-39804"
    },
    {
      "cve": "CVE-2023-40217",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-40217"
    },
    {
      "cve": "CVE-2023-42465",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-42465"
    },
    {
      "cve": "CVE-2023-4255",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-4255"
    },
    {
      "cve": "CVE-2023-45139",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45139"
    },
    {
      "cve": "CVE-2023-45322",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45863",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45863"
    },
    {
      "cve": "CVE-2023-45871",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-46136",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-46218",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46218"
    },
    {
      "cve": "CVE-2023-46219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46219"
    },
    {
      "cve": "CVE-2023-46751",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-46751"
    },
    {
      "cve": "CVE-2023-48795",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-49083",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-49083"
    },
    {
      "cve": "CVE-2023-50447",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50447"
    },
    {
      "cve": "CVE-2023-5049",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5049"
    },
    {
      "cve": "CVE-2023-50495",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50495"
    },
    {
      "cve": "CVE-2023-50782",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-50782"
    },
    {
      "cve": "CVE-2023-51257",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-51257"
    },
    {
      "cve": "CVE-2023-52425",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-5678",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5752",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-5752"
    },
    {
      "cve": "CVE-2023-6004",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6004"
    },
    {
      "cve": "CVE-2023-6597",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6918",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-6918"
    },
    {
      "cve": "CVE-2023-7207",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2023-7207"
    },
    {
      "cve": "CVE-2024-0450",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-0727",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0727"
    },
    {
      "cve": "CVE-2024-0985",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-0985"
    },
    {
      "cve": "CVE-2024-21626",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-21626"
    },
    {
      "cve": "CVE-2024-22195",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22195"
    },
    {
      "cve": "CVE-2024-22365",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-22365"
    },
    {
      "cve": "CVE-2024-23651",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23651"
    },
    {
      "cve": "CVE-2024-23652",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23652"
    },
    {
      "cve": "CVE-2024-23653",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23653"
    },
    {
      "cve": "CVE-2024-23672",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-26130",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26130"
    },
    {
      "cve": "CVE-2024-26458",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-28085",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28085"
    },
    {
      "cve": "CVE-2024-28182",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28219",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28757",
      "product_status": {
        "known_affected": [
          "T045853",
          "T045852",
          "T045854",
          "T038864",
          "T038863",
          "T038862",
          "T038861"
        ]
      },
      "release_date": "2024-11-07T23:00:00.000+00:00",
      "title": "CVE-2024-28757"
    }
  ]
}
  WID-SEC-W-2024-0485
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Kerberos ist ein verteilter Netzwerkdienst zur Authentifizierung. MIT Kerberos ist die freie Implementierung des \"Kerberos network authentication protocol\", des Massachusetts Institute of Technology (MIT).",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in MIT Kerberos ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0485 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0485.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0485 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0485"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
      },
      {
        "category": "external",
        "summary": "Mitre Vulnerability Database vom 2024-02-26",
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462"
      },
      {
        "category": "external",
        "summary": "GitHub LuMingYinDetect vom 2024-02-26",
        "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018218.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018220.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0999-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:0997-1 vom 2024-03-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018219.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1001-1 vom 2024-03-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1006-1 vom 2024-03-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1148-1 vom 2024-04-08",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018275.html"
      },
      {
        "category": "external",
        "summary": "NetApp Security Advisory NTAP-20240415-0010 vom 2024-04-15",
        "url": "https://security.netapp.com/advisory/ntap-20240415-0010/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3268 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3268"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3268 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3268.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2512 vom 2024-06-28",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2512.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-BDC305FE55 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-bdc305fe55"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-1F68985052 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1f68985052"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-DF2C70DBA9 vom 2024-07-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-df2c70dba9"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7160134 vom 2024-07-12",
        "url": "https://www.ibm.com/support/pages/node/7160134"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-348 vom 2024-08-06",
        "url": "https://www.dell.com/support/kbdoc/de-de/000227573/dsa-2024-348-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-security-update-for-multiple-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-412 vom 2024-09-30",
        "url": "https://www.dell.com/support/kbdoc/de-de/000230678/dsa-2024-412-security-update-for-dell-ecs-3-8-1-2-multiple-third-party-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
        "url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin",
        "url": "https://www.ibm.com/support/pages/node/7174634"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9331 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9331"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7178065 vom 2024-12-06",
        "url": "https://www.ibm.com/support/pages/node/7178065"
      }
    ],
    "source_lang": "en-US",
    "title": "MIT Kerberos: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
    "tracking": {
      "current_release_date": "2024-12-08T23:00:00.000+00:00",
      "generator": {
        "date": "2024-12-09T09:21:17.027+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2024-0485",
      "initial_release_date": "2024-02-26T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-02-26T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-03-26T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-03-27T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-08T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-15T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von NetApp aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-07-09T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-07-11T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-08-05T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-09-30T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-10-09T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-10-31T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-12-08T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von IBM aufgenommen"
        }
      ],
      "status": "final",
      "version": "16"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.8.1.2",
                "product": {
                  "name": "Dell ECS \u003c3.8.1.2",
                  "product_id": "T037906"
                }
              },
              {
                "category": "product_version",
                "name": "3.8.1.2",
                "product": {
                  "name": "Dell ECS 3.8.1.2",
                  "product_id": "T037906-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:dell:ecs:3.8.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "ECS"
          },
          {
            "category": "product_name",
            "name": "Dell NetWorker",
            "product": {
              "name": "Dell NetWorker",
              "product_id": "T024663",
              "product_identification_helper": {
                "cpe": "cpe:/a:dell:networker:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "EMC Avamar",
            "product": {
              "name": "EMC Avamar",
              "product_id": "T014381",
              "product_identification_helper": {
                "cpe": "cpe:/a:emc:avamar:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "EMC"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM MQ",
            "product": {
              "name": "IBM MQ",
              "product_id": "T036688",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:mq:operator"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP9",
                  "product_id": "T036127"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP9",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP9",
                  "product_id": "T036127-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up9"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.5.0 UP10 IF01",
                "product": {
                  "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
                  "product_id": "T038741"
                }
              },
              {
                "category": "product_version",
                "name": "7.5.0 UP10 IF01",
                "product": {
                  "name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
                  "product_id": "T038741-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2",
                "product": {
                  "name": "MIT Kerberos krb5-1.21.2",
                  "product_id": "T033104",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:mit:kerberos:krb5-1.21.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Kerberos"
          }
        ],
        "category": "vendor",
        "name": "MIT"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NetApp ActiveIQ Unified Manager",
            "product": {
              "name": "NetApp ActiveIQ Unified Manager",
              "product_id": "T026333",
              "product_identification_helper": {
                "cpe": "cpe:/a:netapp:active_iq_unified_manager:vmware_vsphere"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NetApp"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26462",
      "notes": [
        {
          "category": "description",
          "text": "Es bestehen mehrere Schwachstellen in MIT Kerberos. Diese Fehler bestehen in mehreren Funktionen aufgrund eines Speicherleckproblems. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
        }
      ],
      "product_status": {
        "known_affected": [
          "T033104",
          "T037906",
          "67646",
          "T036127",
          "T036688",
          "T004914",
          "74185",
          "T038741",
          "T014381",
          "T002207",
          "T024663",
          "398363",
          "T026333"
        ]
      },
      "release_date": "2024-02-26T23:00:00.000+00:00",
      "title": "CVE-2024-26462"
    }
  ]
}
  NCSC-2024-0339
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Misinterpretation of Input",
        "title": "CWE-115"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Validation of Array Index",
        "title": "CWE-129"
      },
      {
        "category": "general",
        "text": "Partial String Comparison",
        "title": "CWE-187"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Integer Underflow (Wrap or Wraparound)",
        "title": "CWE-191"
      },
      {
        "category": "general",
        "text": "Off-by-one Error",
        "title": "CWE-193"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Check for Dropped Privileges",
        "title": "CWE-273"
      },
      {
        "category": "general",
        "text": "Improper Handling of Insufficient Permissions or Privileges ",
        "title": "CWE-280"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Improper Validation of Certificate with Host Mismatch",
        "title": "CWE-297"
      },
      {
        "category": "general",
        "text": "Improper Check for Certificate Revocation",
        "title": "CWE-299"
      },
      {
        "category": "general",
        "text": "Cleartext Transmission of Sensitive Information",
        "title": "CWE-319"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Divide By Zero",
        "title": "CWE-369"
      },
      {
        "category": "general",
        "text": "CWE-371",
        "title": "CWE-371"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information into Log File",
        "title": "CWE-532"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Deadlock",
        "title": "CWE-833"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
        "title": "CWE-95"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "title": "Kwetsbaarheden verholpen in Microsoft Mariner",
    "tracking": {
      "current_release_date": "2024-08-13T18:23:22.271316Z",
      "id": "NCSC-2024-0339",
      "initial_release_date": "2024-08-13T18:23:22.271316Z",
      "revision_history": [
        {
          "date": "2024-08-13T18:23:22.271316Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "cbl-mariner",
            "product": {
              "name": "cbl-mariner",
              "product_id": "CSAFPID-1489521",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "microsoft"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2601",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
        }
      ],
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-3775",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3775",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json"
        }
      ],
      "title": "CVE-2022-3775"
    },
    {
      "cve": "CVE-2022-36648",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-36648",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json"
        }
      ],
      "title": "CVE-2022-36648"
    },
    {
      "cve": "CVE-2019-3833",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-3833",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json"
        }
      ],
      "title": "CVE-2019-3833"
    },
    {
      "cve": "CVE-2021-3929",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3929",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json"
        }
      ],
      "title": "CVE-2021-3929"
    },
    {
      "cve": "CVE-2021-4158",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4158",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json"
        }
      ],
      "title": "CVE-2021-4158"
    },
    {
      "cve": "CVE-2021-4206",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4206",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json"
        }
      ],
      "title": "CVE-2021-4206"
    },
    {
      "cve": "CVE-2021-4207",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4207",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json"
        }
      ],
      "title": "CVE-2021-4207"
    },
    {
      "cve": "CVE-2022-26353",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-26353",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json"
        }
      ],
      "title": "CVE-2022-26353"
    },
    {
      "cve": "CVE-2022-35414",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-35414",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json"
        }
      ],
      "title": "CVE-2022-35414"
    },
    {
      "cve": "CVE-2023-3354",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3354",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json"
        }
      ],
      "title": "CVE-2023-3354"
    },
    {
      "cve": "CVE-2022-3872",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "other",
          "text": "Off-by-one Error",
          "title": "CWE-193"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3872",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json"
        }
      ],
      "title": "CVE-2022-3872"
    },
    {
      "cve": "CVE-2022-4144",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-4144",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json"
        }
      ],
      "title": "CVE-2022-4144"
    },
    {
      "cve": "CVE-2023-45288",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45288",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
        }
      ],
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-29404",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29404",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json"
        }
      ],
      "title": "CVE-2023-29404"
    },
    {
      "cve": "CVE-2023-29402",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29402",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json"
        }
      ],
      "title": "CVE-2023-29402"
    },
    {
      "cve": "CVE-2019-3816",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-3816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json"
        }
      ],
      "title": "CVE-2019-3816"
    },
    {
      "cve": "CVE-2021-3750",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3750",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json"
        }
      ],
      "title": "CVE-2021-3750"
    },
    {
      "cve": "CVE-2022-0358",
      "cwe": {
        "id": "CWE-273",
        "name": "Improper Check for Dropped Privileges"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Dropped Privileges",
          "title": "CWE-273"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-0358",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json"
        }
      ],
      "title": "CVE-2022-0358"
    },
    {
      "cve": "CVE-2022-26354",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-26354",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json"
        }
      ],
      "title": "CVE-2022-26354"
    },
    {
      "cve": "CVE-2022-3165",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Integer Underflow (Wrap or Wraparound)",
          "title": "CWE-191"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3165",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json"
        }
      ],
      "title": "CVE-2022-3165"
    },
    {
      "cve": "CVE-2022-2962",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2962",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json"
        }
      ],
      "title": "CVE-2022-2962"
    },
    {
      "cve": "CVE-2022-41722",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-41722",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json"
        }
      ],
      "title": "CVE-2022-41722"
    },
    {
      "cve": "CVE-2022-29526",
      "cwe": {
        "id": "CWE-280",
        "name": "Improper Handling of Insufficient Permissions or Privileges "
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Insufficient Permissions or Privileges ",
          "title": "CWE-280"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-29526",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json"
        }
      ],
      "title": "CVE-2022-29526"
    },
    {
      "cve": "CVE-2007-4559",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2007-4559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json"
        }
      ],
      "title": "CVE-2007-4559"
    },
    {
      "cve": "CVE-2019-9674",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-9674",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json"
        }
      ],
      "title": "CVE-2019-9674"
    },
    {
      "cve": "CVE-2017-18207",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2017-18207",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json"
        }
      ],
      "title": "CVE-2017-18207"
    },
    {
      "cve": "CVE-2019-20907",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-20907",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json"
        }
      ],
      "title": "CVE-2019-20907"
    },
    {
      "cve": "CVE-2021-23336",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-23336",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json"
        }
      ],
      "title": "CVE-2021-23336"
    },
    {
      "cve": "CVE-2017-17522",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2017-17522",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json"
        }
      ],
      "title": "CVE-2017-17522"
    },
    {
      "cve": "CVE-2024-6655",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6655",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json"
        }
      ],
      "title": "CVE-2024-6655"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        },
        {
          "category": "other",
          "text": "Improper Validation of Certificate with Host Mismatch",
          "title": "CWE-297"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2466",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-39331",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
          "title": "CWE-95"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39331",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json"
        }
      ],
      "title": "CVE-2024-39331"
    },
    {
      "cve": "CVE-2021-43565",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-43565",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json"
        }
      ],
      "title": "CVE-2021-43565"
    },
    {
      "cve": "CVE-2024-39277",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Array Index",
          "title": "CWE-129"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39277",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json"
        }
      ],
      "title": "CVE-2024-39277"
    },
    {
      "cve": "CVE-2024-38780",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38780",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json"
        }
      ],
      "title": "CVE-2024-38780"
    },
    {
      "cve": "CVE-2024-39292",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39292",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json"
        }
      ],
      "title": "CVE-2024-39292"
    },
    {
      "cve": "CVE-2024-39482",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39482",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json"
        }
      ],
      "title": "CVE-2024-39482"
    },
    {
      "cve": "CVE-2024-39484",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39484",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json"
        }
      ],
      "title": "CVE-2024-39484"
    },
    {
      "cve": "CVE-2024-39495",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39495",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json"
        }
      ],
      "title": "CVE-2024-39495"
    },
    {
      "cve": "CVE-2024-40902",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40902",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json"
        }
      ],
      "title": "CVE-2024-40902"
    },
    {
      "cve": "CVE-2024-41110",
      "cwe": {
        "id": "CWE-187",
        "name": "Partial String Comparison"
      },
      "notes": [
        {
          "category": "other",
          "text": "Partial String Comparison",
          "title": "CWE-187"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41110",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json"
        }
      ],
      "title": "CVE-2024-41110"
    },
    {
      "cve": "CVE-2024-37298",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37298",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json"
        }
      ],
      "title": "CVE-2024-37298"
    },
    {
      "cve": "CVE-2024-0397",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0397",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
        }
      ],
      "title": "CVE-2024-0397"
    },
    {
      "cve": "CVE-2024-38571",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38571",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json"
        }
      ],
      "title": "CVE-2024-38571"
    },
    {
      "cve": "CVE-2024-42077",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42077",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json"
        }
      ],
      "title": "CVE-2024-42077"
    },
    {
      "cve": "CVE-2024-39473",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39473",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json"
        }
      ],
      "title": "CVE-2024-39473"
    },
    {
      "cve": "CVE-2024-26900",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26900",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json"
        }
      ],
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-39474",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39474",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json"
        }
      ],
      "title": "CVE-2024-39474"
    },
    {
      "cve": "CVE-2024-42073",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42073",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json"
        }
      ],
      "title": "CVE-2024-42073"
    },
    {
      "cve": "CVE-2024-42074",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42074",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json"
        }
      ],
      "title": "CVE-2024-42074"
    },
    {
      "cve": "CVE-2024-42075",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42075",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json"
        }
      ],
      "title": "CVE-2024-42075"
    },
    {
      "cve": "CVE-2024-42078",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42078",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json"
        }
      ],
      "title": "CVE-2024-42078"
    },
    {
      "cve": "CVE-2024-0853",
      "cwe": {
        "id": "CWE-299",
        "name": "Improper Check for Certificate Revocation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Certificate Revocation",
          "title": "CWE-299"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0853",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json"
        }
      ],
      "title": "CVE-2024-0853"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Transmission of Sensitive Information",
          "title": "CWE-319"
        },
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-38662",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38662",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json"
        }
      ],
      "title": "CVE-2024-38662"
    },
    {
      "cve": "CVE-2024-36288",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36288",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json"
        }
      ],
      "title": "CVE-2024-36288"
    },
    {
      "cve": "CVE-2024-39480",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39480",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json"
        }
      ],
      "title": "CVE-2024-39480"
    },
    {
      "cve": "CVE-2024-39476",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deadlock",
          "title": "CWE-833"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39476",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json"
        }
      ],
      "title": "CVE-2024-39476"
    },
    {
      "cve": "CVE-2024-39475",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "other",
          "text": "Divide By Zero",
          "title": "CWE-369"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39475",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json"
        }
      ],
      "title": "CVE-2024-39475"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26461",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json"
        }
      ],
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-6104",
      "cwe": {
        "id": "CWE-532",
        "name": "Insertion of Sensitive Information into Log File"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information into Log File",
          "title": "CWE-532"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6104",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json"
        }
      ],
      "title": "CVE-2024-6104"
    },
    {
      "cve": "CVE-2024-6257",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6257",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json"
        }
      ],
      "title": "CVE-2024-6257"
    },
    {
      "cve": "CVE-2024-23722",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23722",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json"
        }
      ],
      "title": "CVE-2024-23722"
    },
    {
      "cve": "CVE-2024-40898",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40898",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
        }
      ],
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-38583",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38583",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json"
        }
      ],
      "title": "CVE-2024-38583"
    },
    {
      "cve": "CVE-2024-39493",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39493",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json"
        }
      ],
      "title": "CVE-2024-39493"
    },
    {
      "cve": "CVE-2024-42068",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42068",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json"
        }
      ],
      "title": "CVE-2024-42068"
    },
    {
      "cve": "CVE-2024-39489",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39489",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json"
        }
      ],
      "title": "CVE-2024-39489"
    },
    {
      "cve": "CVE-2024-42070",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42070",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json"
        }
      ],
      "title": "CVE-2024-42070"
    },
    {
      "cve": "CVE-2024-42076",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42076",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json"
        }
      ],
      "title": "CVE-2024-42076"
    },
    {
      "cve": "CVE-2024-42080",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42080",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json"
        }
      ],
      "title": "CVE-2024-42080"
    },
    {
      "cve": "CVE-2024-38428",
      "cwe": {
        "id": "CWE-115",
        "name": "Misinterpretation of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38428",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json"
        }
      ],
      "title": "CVE-2024-38428"
    },
    {
      "cve": "CVE-2024-42082",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42082",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json"
        }
      ],
      "title": "CVE-2024-42082"
    },
    {
      "cve": "CVE-2022-48788",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-48788",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json"
        }
      ],
      "title": "CVE-2022-48788"
    },
    {
      "cve": "CVE-2023-52340",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52340",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json"
        }
      ],
      "title": "CVE-2023-52340"
    },
    {
      "cve": "CVE-2022-48841",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-48841",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json"
        }
      ],
      "title": "CVE-2022-48841"
    },
    {
      "cve": "CVE-2024-39485",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39485",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json"
        }
      ],
      "title": "CVE-2024-39485"
    },
    {
      "cve": "CVE-2024-39483",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39483",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json"
        }
      ],
      "title": "CVE-2024-39483"
    },
    {
      "cve": "CVE-2024-42071",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42071",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json"
        }
      ],
      "title": "CVE-2024-42071"
    },
    {
      "cve": "CVE-2024-42072",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42072",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json"
        }
      ],
      "title": "CVE-2024-42072"
    },
    {
      "cve": "CVE-2024-42237",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42237",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json"
        }
      ],
      "title": "CVE-2024-42237"
    },
    {
      "cve": "CVE-2024-42083",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42083",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json"
        }
      ],
      "title": "CVE-2024-42083"
    }
  ]
}
  ncsc-2024-0339
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Microsoft heeft kwetsbaarheden verholpen in Mariner (Azure Linux).",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden betreffen oudere kwetsbaarheden in diverse subcomponenten van de distro, zoals Python, Emacs, Qemu, Django, Curl, wget etc. welke in de nieuwe versie zijn verholpen.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Misinterpretation of Input",
        "title": "CWE-115"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Validation of Array Index",
        "title": "CWE-129"
      },
      {
        "category": "general",
        "text": "Partial String Comparison",
        "title": "CWE-187"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Integer Underflow (Wrap or Wraparound)",
        "title": "CWE-191"
      },
      {
        "category": "general",
        "text": "Off-by-one Error",
        "title": "CWE-193"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Check for Dropped Privileges",
        "title": "CWE-273"
      },
      {
        "category": "general",
        "text": "Improper Handling of Insufficient Permissions or Privileges ",
        "title": "CWE-280"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Improper Validation of Certificate with Host Mismatch",
        "title": "CWE-297"
      },
      {
        "category": "general",
        "text": "Improper Check for Certificate Revocation",
        "title": "CWE-299"
      },
      {
        "category": "general",
        "text": "Cleartext Transmission of Sensitive Information",
        "title": "CWE-319"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Divide By Zero",
        "title": "CWE-369"
      },
      {
        "category": "general",
        "text": "CWE-371",
        "title": "CWE-371"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Insertion of Sensitive Information into Log File",
        "title": "CWE-532"
      },
      {
        "category": "general",
        "text": "Improper Locking",
        "title": "CWE-667"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Deadlock",
        "title": "CWE-833"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
        "title": "CWE-95"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "title": "Kwetsbaarheden verholpen in Microsoft Mariner",
    "tracking": {
      "current_release_date": "2024-08-13T18:23:22.271316Z",
      "id": "NCSC-2024-0339",
      "initial_release_date": "2024-08-13T18:23:22.271316Z",
      "revision_history": [
        {
          "date": "2024-08-13T18:23:22.271316Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "cbl-mariner",
            "product": {
              "name": "cbl-mariner",
              "product_id": "CSAFPID-1489521",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "microsoft"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2601",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
        }
      ],
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-3775",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3775",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3775.json"
        }
      ],
      "title": "CVE-2022-3775"
    },
    {
      "cve": "CVE-2022-36648",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-36648",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36648.json"
        }
      ],
      "title": "CVE-2022-36648"
    },
    {
      "cve": "CVE-2019-3833",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-3833",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3833.json"
        }
      ],
      "title": "CVE-2019-3833"
    },
    {
      "cve": "CVE-2021-3929",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3929",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3929.json"
        }
      ],
      "title": "CVE-2021-3929"
    },
    {
      "cve": "CVE-2021-4158",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4158",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4158.json"
        }
      ],
      "title": "CVE-2021-4158"
    },
    {
      "cve": "CVE-2021-4206",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4206",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4206.json"
        }
      ],
      "title": "CVE-2021-4206"
    },
    {
      "cve": "CVE-2021-4207",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-4207",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-4207.json"
        }
      ],
      "title": "CVE-2021-4207"
    },
    {
      "cve": "CVE-2022-26353",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-26353",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26353.json"
        }
      ],
      "title": "CVE-2022-26353"
    },
    {
      "cve": "CVE-2022-35414",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-35414",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-35414.json"
        }
      ],
      "title": "CVE-2022-35414"
    },
    {
      "cve": "CVE-2023-3354",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3354",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3354.json"
        }
      ],
      "title": "CVE-2023-3354"
    },
    {
      "cve": "CVE-2022-3872",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "other",
          "text": "Off-by-one Error",
          "title": "CWE-193"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3872",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3872.json"
        }
      ],
      "title": "CVE-2022-3872"
    },
    {
      "cve": "CVE-2022-4144",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-4144",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-4144.json"
        }
      ],
      "title": "CVE-2022-4144"
    },
    {
      "cve": "CVE-2023-45288",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45288",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json"
        }
      ],
      "title": "CVE-2023-45288"
    },
    {
      "cve": "CVE-2023-29404",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29404",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29404.json"
        }
      ],
      "title": "CVE-2023-29404"
    },
    {
      "cve": "CVE-2023-29402",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-29402",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29402.json"
        }
      ],
      "title": "CVE-2023-29402"
    },
    {
      "cve": "CVE-2019-3816",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-3816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-3816.json"
        }
      ],
      "title": "CVE-2019-3816"
    },
    {
      "cve": "CVE-2021-3750",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-3750",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-3750.json"
        }
      ],
      "title": "CVE-2021-3750"
    },
    {
      "cve": "CVE-2022-0358",
      "cwe": {
        "id": "CWE-273",
        "name": "Improper Check for Dropped Privileges"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Dropped Privileges",
          "title": "CWE-273"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-0358",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-0358.json"
        }
      ],
      "title": "CVE-2022-0358"
    },
    {
      "cve": "CVE-2022-26354",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-26354",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26354.json"
        }
      ],
      "title": "CVE-2022-26354"
    },
    {
      "cve": "CVE-2022-3165",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Integer Underflow (Wrap or Wraparound)",
          "title": "CWE-191"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3165",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3165.json"
        }
      ],
      "title": "CVE-2022-3165"
    },
    {
      "cve": "CVE-2022-2962",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2962",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2962.json"
        }
      ],
      "title": "CVE-2022-2962"
    },
    {
      "cve": "CVE-2022-41722",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-41722",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41722.json"
        }
      ],
      "title": "CVE-2022-41722"
    },
    {
      "cve": "CVE-2022-29526",
      "cwe": {
        "id": "CWE-280",
        "name": "Improper Handling of Insufficient Permissions or Privileges "
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Insufficient Permissions or Privileges ",
          "title": "CWE-280"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-29526",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-29526.json"
        }
      ],
      "title": "CVE-2022-29526"
    },
    {
      "cve": "CVE-2007-4559",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2007-4559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2007/CVE-2007-4559.json"
        }
      ],
      "title": "CVE-2007-4559"
    },
    {
      "cve": "CVE-2019-9674",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-9674",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-9674.json"
        }
      ],
      "title": "CVE-2019-9674"
    },
    {
      "cve": "CVE-2017-18207",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2017-18207",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-18207.json"
        }
      ],
      "title": "CVE-2017-18207"
    },
    {
      "cve": "CVE-2019-20907",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2019-20907",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-20907.json"
        }
      ],
      "title": "CVE-2019-20907"
    },
    {
      "cve": "CVE-2021-23336",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-23336",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23336.json"
        }
      ],
      "title": "CVE-2021-23336"
    },
    {
      "cve": "CVE-2017-17522",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2017-17522",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2017/CVE-2017-17522.json"
        }
      ],
      "title": "CVE-2017-17522"
    },
    {
      "cve": "CVE-2024-6655",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6655",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6655.json"
        }
      ],
      "title": "CVE-2024-6655"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        },
        {
          "category": "other",
          "text": "Improper Validation of Certificate with Host Mismatch",
          "title": "CWE-297"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2466",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2466.json"
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-39331",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
          "title": "CWE-95"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39331",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39331.json"
        }
      ],
      "title": "CVE-2024-39331"
    },
    {
      "cve": "CVE-2021-43565",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-43565",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43565.json"
        }
      ],
      "title": "CVE-2021-43565"
    },
    {
      "cve": "CVE-2024-39277",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Array Index",
          "title": "CWE-129"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39277",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39277.json"
        }
      ],
      "title": "CVE-2024-39277"
    },
    {
      "cve": "CVE-2024-38780",
      "cwe": {
        "id": "CWE-371",
        "name": "-"
      },
      "notes": [
        {
          "category": "other",
          "text": "CWE-371",
          "title": "CWE-371"
        },
        {
          "category": "other",
          "text": "Improper Locking",
          "title": "CWE-667"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38780",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38780.json"
        }
      ],
      "title": "CVE-2024-38780"
    },
    {
      "cve": "CVE-2024-39292",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39292",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39292.json"
        }
      ],
      "title": "CVE-2024-39292"
    },
    {
      "cve": "CVE-2024-39482",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39482",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39482.json"
        }
      ],
      "title": "CVE-2024-39482"
    },
    {
      "cve": "CVE-2024-39484",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39484",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39484.json"
        }
      ],
      "title": "CVE-2024-39484"
    },
    {
      "cve": "CVE-2024-39495",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39495",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39495.json"
        }
      ],
      "title": "CVE-2024-39495"
    },
    {
      "cve": "CVE-2024-40902",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40902",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40902.json"
        }
      ],
      "title": "CVE-2024-40902"
    },
    {
      "cve": "CVE-2024-41110",
      "cwe": {
        "id": "CWE-187",
        "name": "Partial String Comparison"
      },
      "notes": [
        {
          "category": "other",
          "text": "Partial String Comparison",
          "title": "CWE-187"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41110",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41110.json"
        }
      ],
      "title": "CVE-2024-41110"
    },
    {
      "cve": "CVE-2024-37298",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37298",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37298.json"
        }
      ],
      "title": "CVE-2024-37298"
    },
    {
      "cve": "CVE-2024-0397",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0397",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
        }
      ],
      "title": "CVE-2024-0397"
    },
    {
      "cve": "CVE-2024-38571",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38571",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38571.json"
        }
      ],
      "title": "CVE-2024-38571"
    },
    {
      "cve": "CVE-2024-42077",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42077",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42077.json"
        }
      ],
      "title": "CVE-2024-42077"
    },
    {
      "cve": "CVE-2024-39473",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39473",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39473.json"
        }
      ],
      "title": "CVE-2024-39473"
    },
    {
      "cve": "CVE-2024-26900",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26900",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26900.json"
        }
      ],
      "title": "CVE-2024-26900"
    },
    {
      "cve": "CVE-2024-39474",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39474",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39474.json"
        }
      ],
      "title": "CVE-2024-39474"
    },
    {
      "cve": "CVE-2024-42073",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42073",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42073.json"
        }
      ],
      "title": "CVE-2024-42073"
    },
    {
      "cve": "CVE-2024-42074",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42074",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42074.json"
        }
      ],
      "title": "CVE-2024-42074"
    },
    {
      "cve": "CVE-2024-42075",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42075",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42075.json"
        }
      ],
      "title": "CVE-2024-42075"
    },
    {
      "cve": "CVE-2024-42078",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42078",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42078.json"
        }
      ],
      "title": "CVE-2024-42078"
    },
    {
      "cve": "CVE-2024-0853",
      "cwe": {
        "id": "CWE-299",
        "name": "Improper Check for Certificate Revocation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check for Certificate Revocation",
          "title": "CWE-299"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0853",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0853.json"
        }
      ],
      "title": "CVE-2024-0853"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Cleartext Transmission of Sensitive Information",
          "title": "CWE-319"
        },
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2004",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2004.json"
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-38662",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38662",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38662.json"
        }
      ],
      "title": "CVE-2024-38662"
    },
    {
      "cve": "CVE-2024-36288",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36288",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36288.json"
        }
      ],
      "title": "CVE-2024-36288"
    },
    {
      "cve": "CVE-2024-39480",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39480",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39480.json"
        }
      ],
      "title": "CVE-2024-39480"
    },
    {
      "cve": "CVE-2024-39476",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deadlock",
          "title": "CWE-833"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39476",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39476.json"
        }
      ],
      "title": "CVE-2024-39476"
    },
    {
      "cve": "CVE-2024-39475",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "other",
          "text": "Divide By Zero",
          "title": "CWE-369"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39475",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39475.json"
        }
      ],
      "title": "CVE-2024-39475"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-26461",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26461",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26461.json"
        }
      ],
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-6104",
      "cwe": {
        "id": "CWE-532",
        "name": "Insertion of Sensitive Information into Log File"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insertion of Sensitive Information into Log File",
          "title": "CWE-532"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6104",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6104.json"
        }
      ],
      "title": "CVE-2024-6104"
    },
    {
      "cve": "CVE-2024-6257",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6257",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6257.json"
        }
      ],
      "title": "CVE-2024-6257"
    },
    {
      "cve": "CVE-2024-23722",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23722",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23722.json"
        }
      ],
      "title": "CVE-2024-23722"
    },
    {
      "cve": "CVE-2024-40898",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40898",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
        }
      ],
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-38583",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38583",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38583.json"
        }
      ],
      "title": "CVE-2024-38583"
    },
    {
      "cve": "CVE-2024-39493",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39493",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39493.json"
        }
      ],
      "title": "CVE-2024-39493"
    },
    {
      "cve": "CVE-2024-42068",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42068",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42068.json"
        }
      ],
      "title": "CVE-2024-42068"
    },
    {
      "cve": "CVE-2024-39489",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39489",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39489.json"
        }
      ],
      "title": "CVE-2024-39489"
    },
    {
      "cve": "CVE-2024-42070",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42070",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42070.json"
        }
      ],
      "title": "CVE-2024-42070"
    },
    {
      "cve": "CVE-2024-42076",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42076",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42076.json"
        }
      ],
      "title": "CVE-2024-42076"
    },
    {
      "cve": "CVE-2024-42080",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42080",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42080.json"
        }
      ],
      "title": "CVE-2024-42080"
    },
    {
      "cve": "CVE-2024-38428",
      "cwe": {
        "id": "CWE-115",
        "name": "Misinterpretation of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38428",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38428.json"
        }
      ],
      "title": "CVE-2024-38428"
    },
    {
      "cve": "CVE-2024-42082",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42082",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42082.json"
        }
      ],
      "title": "CVE-2024-42082"
    },
    {
      "cve": "CVE-2022-48788",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-48788",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48788.json"
        }
      ],
      "title": "CVE-2022-48788"
    },
    {
      "cve": "CVE-2023-52340",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52340",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52340.json"
        }
      ],
      "title": "CVE-2023-52340"
    },
    {
      "cve": "CVE-2022-48841",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-48841",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48841.json"
        }
      ],
      "title": "CVE-2022-48841"
    },
    {
      "cve": "CVE-2024-39485",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39485",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39485.json"
        }
      ],
      "title": "CVE-2024-39485"
    },
    {
      "cve": "CVE-2024-39483",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39483",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39483.json"
        }
      ],
      "title": "CVE-2024-39483"
    },
    {
      "cve": "CVE-2024-42071",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42071",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42071.json"
        }
      ],
      "title": "CVE-2024-42071"
    },
    {
      "cve": "CVE-2024-42072",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42072",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42072.json"
        }
      ],
      "title": "CVE-2024-42072"
    },
    {
      "cve": "CVE-2024-42237",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42237",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42237.json"
        }
      ],
      "title": "CVE-2024-42237"
    },
    {
      "cve": "CVE-2024-42083",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-42083",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-42083.json"
        }
      ],
      "title": "CVE-2024-42083"
    }
  ]
}
  gsd-2024-26461
Vulnerability from gsd
{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2024-26461"
      ],
      "details": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
      "id": "GSD-2024-26461",
      "modified": "2024-02-20T06:02:29.092208Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2024-26461",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md",
            "refsource": "MISC",
            "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20240415-0011/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20240415-0011/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c."
          }
        ],
        "id": "CVE-2024-26461",
        "lastModified": "2024-02-29T13:49:29.390",
        "metrics": {},
        "published": "2024-02-29T01:44:18.820",
        "references": [
          {
            "source": "cve@mitre.org",
            "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
          }
        ],
        "sourceIdentifier": "cve@mitre.org",
        "vulnStatus": "Awaiting Analysis"
      }
    }
  }
}
  fkie_cve-2024-26461
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md | Exploit | |
| cve@mitre.org | https://security.netapp.com/advisory/ntap-20240415-0011/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240415-0011/ | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| mit | kerberos_5 | 1.21.2 | |
| netapp | active_iq_unified_manager | - | |
| netapp | cloud_volumes_ontap_mediator | - | |
| netapp | management_services_for_element_software_and_netapp_hci | - | |
| netapp | ontap_9 | - | |
| netapp | ontap_select_deploy_administration_utility | - | |
| netapp | h610c_firmware | - | |
| netapp | h610c | - | |
| netapp | h610s_firmware | - | |
| netapp | h610s | - | |
| netapp | h615c_firmware | - | |
| netapp | h615c | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mit:kerberos_5:1.21.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F95920FF-DDA8-4D74-9CFE-81FCD071031D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
              "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "280AA828-6FA9-4260-8EC1-019423B966E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_element_software_and_netapp_hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDAC85F0-93AF-4BE3-AE1A-8ADAF1CDF9AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD886814-B4A0-4764-9F08-2060601D8E89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c."
    },
    {
      "lang": "es",
      "value": "Kerberos 5 (tambi\u00e9n conocido como krb5) 1.21.2 contiene una vulnerabilidad de p\u00e9rdida de memoria en /krb5/src/lib/gssapi/krb5/k5sealv3.c."
    }
  ],
  "id": "CVE-2024-26461",
  "lastModified": "2025-05-23T15:30:30.847",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-29T01:44:18.820",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20240415-0011/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20240415-0011/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}
  opensuse-su-2024:13921-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "krb5-1.21.2-3.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the krb5-1.21.2-3.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13921",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13921-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26458 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26458/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26461 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26461/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26462 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26462/"
      }
    ],
    "title": "krb5-1.21.2-3.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13921-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-1.21.2-3.1.aarch64",
                  "product_id": "krb5-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-32bit-1.21.2-3.1.aarch64",
                  "product_id": "krb5-32bit-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-client-1.21.2-3.1.aarch64",
                  "product_id": "krb5-client-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-devel-1.21.2-3.1.aarch64",
                  "product_id": "krb5-devel-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-devel-32bit-1.21.2-3.1.aarch64",
                  "product_id": "krb5-devel-32bit-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
                  "product_id": "krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
                  "product_id": "krb5-plugin-preauth-otp-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
                  "product_id": "krb5-plugin-preauth-spake-1.21.2-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.21.2-3.1.aarch64",
                "product": {
                  "name": "krb5-server-1.21.2-3.1.aarch64",
                  "product_id": "krb5-server-1.21.2-3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-32bit-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-32bit-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-client-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-client-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-devel-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-devel-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-devel-32bit-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-devel-32bit-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.21.2-3.1.ppc64le",
                "product": {
                  "name": "krb5-server-1.21.2-3.1.ppc64le",
                  "product_id": "krb5-server-1.21.2-3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-1.21.2-3.1.s390x",
                  "product_id": "krb5-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-32bit-1.21.2-3.1.s390x",
                  "product_id": "krb5-32bit-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-client-1.21.2-3.1.s390x",
                  "product_id": "krb5-client-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-devel-1.21.2-3.1.s390x",
                  "product_id": "krb5-devel-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-devel-32bit-1.21.2-3.1.s390x",
                  "product_id": "krb5-devel-32bit-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
                  "product_id": "krb5-plugin-kdb-ldap-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
                  "product_id": "krb5-plugin-preauth-otp-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
                  "product_id": "krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
                  "product_id": "krb5-plugin-preauth-spake-1.21.2-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.21.2-3.1.s390x",
                "product": {
                  "name": "krb5-server-1.21.2-3.1.s390x",
                  "product_id": "krb5-server-1.21.2-3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "krb5-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-1.21.2-3.1.x86_64",
                  "product_id": "krb5-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-32bit-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-32bit-1.21.2-3.1.x86_64",
                  "product_id": "krb5-32bit-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-client-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-client-1.21.2-3.1.x86_64",
                  "product_id": "krb5-client-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-devel-1.21.2-3.1.x86_64",
                  "product_id": "krb5-devel-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-devel-32bit-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-devel-32bit-1.21.2-3.1.x86_64",
                  "product_id": "krb5-devel-32bit-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
                  "product_id": "krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
                  "product_id": "krb5-plugin-preauth-otp-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
                  "product_id": "krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
                  "product_id": "krb5-plugin-preauth-spake-1.21.2-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "krb5-server-1.21.2-3.1.x86_64",
                "product": {
                  "name": "krb5-server-1.21.2-3.1.x86_64",
                  "product_id": "krb5-server-1.21.2-3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-32bit-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-32bit-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-32bit-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-32bit-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-32bit-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-client-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-client-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-client-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-client-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-client-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-devel-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-devel-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-devel-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-devel-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-32bit-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-devel-32bit-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-32bit-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-devel-32bit-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-32bit-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-devel-32bit-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-devel-32bit-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-devel-32bit-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-otp-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-plugin-preauth-spake-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.21.2-3.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64"
        },
        "product_reference": "krb5-server-1.21.2-3.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.21.2-3.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le"
        },
        "product_reference": "krb5-server-1.21.2-3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.21.2-3.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x"
        },
        "product_reference": "krb5-server-1.21.2-3.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "krb5-server-1.21.2-3.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
        },
        "product_reference": "krb5-server-1.21.2-3.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26458",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26458"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26458",
          "url": "https://www.suse.com/security/cve/CVE-2024-26458"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26458",
          "url": "https://bugzilla.suse.com/1220770"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26458"
    },
    {
      "cve": "CVE-2024-26461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26461",
          "url": "https://www.suse.com/security/cve/CVE-2024-26461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220771 for CVE-2024-26461",
          "url": "https://bugzilla.suse.com/1220771"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26461"
    },
    {
      "cve": "CVE-2024-26462",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26462"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
          "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26462",
          "url": "https://www.suse.com/security/cve/CVE-2024-26462"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220770 for CVE-2024-26462",
          "url": "https://bugzilla.suse.com/1220770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220772 for CVE-2024-26462",
          "url": "https://bugzilla.suse.com/1220772"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-client-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-devel-32bit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-kdb-ldap-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-otp-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-pkinit-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-plugin-preauth-spake-1.21.2-3.1.x86_64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.aarch64",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.ppc64le",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.s390x",
            "openSUSE Tumbleweed:krb5-server-1.21.2-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26462"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.